Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn moreIn Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable if Reactor Netty HTTP Server built-in integration with Micrometer is enabled.
Users of affected versions should apply the following mitigation. 1.1.x users should upgrade to 1.1.13. 1.0.x users should upgrade to 1.0.39. No other steps are necessary.
Releases that have fixed this issue include:
As a temporary workaround, Reactor Netty 1.1.x and 1.0.x users can choose to disable Reactor Netty HTTP Server built-in integration with Micrometer.
The issue was identified and responsibly reported by James Yuzawa (https://github.com/yuzawa-san).
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy