Netty 4.1.43.Final permet le trafic illicite de demande HTTP car il malmène Transfer-Encoding des espaces (comme un [espace] Transfer-Encoding: ligne chunked) et plus tard en-tête Content-Length. Ce problème existe en raison d’une correction incomplète pour CVE-2019-16869.
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/
https://github.com/jdordonezn/CVE-2020-72381/issues/1
https://netty.io/news/
https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0497
https://access.redhat.com/errata/RHSA-2020:0567
https://access.redhat.com/errata/RHSA-2020:0601
https://access.redhat.com/errata/RHSA-2020:0605
https://access.redhat.com/errata/RHSA-2020:0606
https://access.redhat.com/errata/RHSA-2020:0804
https://access.redhat.com/errata/RHSA-2020:0805
https://access.redhat.com/errata/RHSA-2020:0806
https://access.redhat.com/errata/RHSA-2020:0811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7238