Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.878339
Kategorie:Fedora Local Security Checks
Titel:Fedora: Security Advisory for netty (FEDORA-2020-66b5f85ccc)
Zusammenfassung:The remote host is missing an update for the 'netty'; package(s) announced via the FEDORA-2020-66b5f85ccc advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'netty'
package(s) announced via the FEDORA-2020-66b5f85ccc advisory.

Vulnerability Insight:
Netty is a NIO client server framework which enables quick and easy
development of network applications such as protocol servers and
clients. It greatly simplifies and streamlines network programming
such as TCP and UDP socket server.

', Quick and easy', doesn', t mean that a resulting application will suffer
from a maintainability or a performance issue. Netty has been designed
carefully with the experiences earned from the implementation of a lot
of protocols such as FTP, SMTP, HTTP, and various binary and
text-based legacy protocols. As a result, Netty has succeeded to find
a way to achieve ease of development, performance, stability, and
flexibility without a compromise.

Affected Software/OS:
'netty' package(s) on Fedora 33.

Solution:
Please install the updated package(s).

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-7238
Debian Security Information: DSA-4885 (Google Search)
https://www.debian.org/security/2021/dsa-4885
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/
https://github.com/jdordonezn/CVE-2020-72381/issues/1
https://netty.io/news/
https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html
RedHat Security Advisories: RHSA-2020:0497
https://access.redhat.com/errata/RHSA-2020:0497
RedHat Security Advisories: RHSA-2020:0567
https://access.redhat.com/errata/RHSA-2020:0567
RedHat Security Advisories: RHSA-2020:0601
https://access.redhat.com/errata/RHSA-2020:0601
RedHat Security Advisories: RHSA-2020:0605
https://access.redhat.com/errata/RHSA-2020:0605
RedHat Security Advisories: RHSA-2020:0606
https://access.redhat.com/errata/RHSA-2020:0606
RedHat Security Advisories: RHSA-2020:0804
https://access.redhat.com/errata/RHSA-2020:0804
RedHat Security Advisories: RHSA-2020:0805
https://access.redhat.com/errata/RHSA-2020:0805
RedHat Security Advisories: RHSA-2020:0806
https://access.redhat.com/errata/RHSA-2020:0806
RedHat Security Advisories: RHSA-2020:0811
https://access.redhat.com/errata/RHSA-2020:0811
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.