• 公告ID (KylinSec-SA-2024-3851)

摘要:

netty3 security update

安全等级: Critical

公告ID: KylinSec-SA-2024-3851

发布日期: 2024年8月30日

关联CVE: CVE-2019-16869   CVE-2019-20444   CVE-2019-20445  

  • 详细介绍

1. 漏洞描述

   

Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Security Fix(es):

Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.(CVE-2019-16869)

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."(CVE-2019-20444)

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.(CVE-2019-20445)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2019-16869 KY3.4-5A netty3 Fixed
CVE-2019-20444 KY3.4-5A netty3 Fixed
CVE-2019-20445 KY3.4-5A netty3 Fixed

3. 影响组件

    netty3

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
netty3 noarch 3.10.6-8.kb1.ky3_4

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     netty3   

aarch64:

     netty3   

上一篇:KylinSec-SA-2024-3579 下一篇:KylinSec-SA-2024-3853