CNNVD-ID编号 | CNNVD-202001-1317 |
CVE编号 | CVE-2019-20444 |
发布时间 | 2020-01-29 |
更新时间 | 2021-01-14 |
漏洞类型 | 环境问题 |
漏洞来源 | N/A |
危险等级 | 超危 |
威胁类型 | 远程 |
厂 商 | N/A |
Netty是Netty社区的一款非阻塞I/O客户端-服务器框架,它主要用于开发Java网络应用程序,如协议服务器和客户端等。
Netty 4.1.44之前版本中的HttpObjectDecoder.java文件存在环境问题漏洞。该漏洞源于网络系统或产品的环境因素不合理。
目前厂商已发布升级了Netty 环境问题漏洞的补丁,Netty 环境问题漏洞的补丁获取链接:
https://github.com/netty/netty/issues/9866
来源:github.com
链接:https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final
来源:REDHAT
来源:REDHAT
来源:MLIST
来源:MLIST
来源:MLIST
来源:REDHAT
来源:REDHAT
来源:REDHAT
来源:MISC
来源:MLIST
来源:MLIST
来源:MISC
来源:MLIST
来源:MLIST
来源:REDHAT
来源:MISC
来源:MLIST
来源:REDHAT
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html
来源:MISC
来源:UBUNTU
来源:MLIST
来源:FEDORA
来源:REDHAT
来源:lists.apache.org
来源:REDHAT
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
来源:MLIST
来源:MISC
来源:MLIST
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html
来源:MLIST
来源:MLIST
来源:MISC
来源:MLIST
来源:lists.apache.org
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html
来源:MLIST
来源:MLIST
来源:MISC
来源:MLIST
来源:MISC
来源:access.redhat.com
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158636/Red-Hat-Security-Advisory-2020-3192-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156701/Red-Hat-Security-Advisory-2020-0804-01.html
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157214/Red-Hat-Security-Advisory-2020-1445-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156611/Red-Hat-Security-Advisory-2020-0567-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159741/Ubuntu-Security-Notice-USN-4600-2.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157859/Red-Hat-Security-Advisory-2020-2333-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156325/Red-Hat-Security-Advisory-2020-0497-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156880/Red-Hat-Security-Advisory-2020-0951-01.html
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.ibm.com
来源:www.nsfocus.net
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156868/Red-Hat-Security-Advisory-2020-0939-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158651/Red-Hat-Security-Advisory-2020-3197-01.html
来源:www.auscert.org.au
来源:nvd.nist.gov
来源:http-tcp-proxy-component-in-rational-test-virtualization-server-and-rational-test-workbench-affected-by-netty-vulnerabilities-cve-2020-7238-cve-2019-16
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-rational-integration-tester-
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159269/Ubuntu-Security-Notice-USN-4532-1.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157835/Red-Hat-Security-Advisory-2020-2321-01.html
暂无