References: | Source: MITRE Type: CNA CVE-2020-11612
Source: XF Type: UNKNOWN netty-cve202011612-dos(180530)
Source: MISC Type: Patch, Third Party Advisory https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final
Source: CCN Type: Netty GIT Repository Compression/Decompression Codecs should enforce memory allocation size limits #6168
Source: MISC Type: Third Party Advisory https://github.com/netty/netty/issues/6168
Source: MISC Type: Patch, Third Party Advisory https://github.com/netty/netty/pull/9924
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200409 [GitHub] [druid] ccaominh opened a new pull request #9654: [Backport] Upgrade netty 4 to fix CVE-2020-11612 (#9651)
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200413 [jira] [Assigned] (ZOOKEEPER-3794) upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20200415 [zookeeper] branch master updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200408 [GitHub] [druid] ccaominh opened a new pull request #9651: Upgrade netty 4 to fix CVE-2020-11612
Source: MISC Type: Mailing List, Third Party Advisory https://lists.apache.org/thread.html/r31424427cc6d7db46beac481bdeed9a823fc20bb1b9deede38557f71@%3Cnotifications.zookeeper.apache.org%3E
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200409 [GitHub] [druid] jon-wei merged pull request #9651: Upgrade netty 4 to fix CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-branch36-java8 #137
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200415 [GitHub] [zookeeper] eolivelli closed pull request #1319: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200504 Build failed in Jenkins: zookeeper-master-maven #784
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200415 Build failed in Jenkins: zookeeper-master-maven-jdk12 #465
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200504 Build failed in Jenkins: zookeeper-master-maven-jdk12 #490
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200413 [jira] [Updated] (ZOOKEEPER-3794) upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-commits] 20200504 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612 - fixed file rename typo
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200504 Build failed in Jenkins: zookeeper-master-maven-owasp #489
Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210121 [GitHub] [pulsar] hpvd commented on issue #9249: Upgrade Netty dependency in broker to solve vulnerabilities: CVE-2019-16869, CVE-2020-11612, CVE-2019-20445, CVE-2019-20444
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [druid-commits] 20200409 [druid] branch 0.18.0 updated: Upgrade netty 4 to fix CVE-2020-11612 (#9651) (#9654)
Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210120 [GitHub] [pulsar] fmiguelez opened a new issue #9249: Upgrade Netty dependency in broker to solve vulnerabilities: CVE-2019-16869, CVE-2020-11612, CVE-2019-20445, CVE-2019-20444
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20200415 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200413 [jira] [Created] (ZOOKEEPER-3794) upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200409 [GitHub] [druid] jon-wei merged pull request #9654: [Backport] Upgrade netty 4 to fix CVE-2020-11612 (#9651)
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-commits] 20200504 [zookeeper] branch master updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612 - fixed file rename typo
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20200415 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200409 [GitHub] [druid] ccaominh commented on issue #9654: [Backport] Upgrade netty 4 to fix CVE-2020-11612 (#9651)
Source: MLIST Type: Mailing List, Third Party Advisory [flink-issues] 20200910 [jira] [Created] (FLINK-19195) question on security vulnerabilities in flink
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200414 [GitHub] [zookeeper] phunt commented on issue #1319: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210122 [GitHub] [pulsar] hpvd commented on issue #9249: Upgrade Netty dependency in broker to solve vulnerabilities: CVE-2019-16869, CVE-2020-11612, CVE-2019-20445, CVE-2019-20444
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200415 [jira] [Resolved] (ZOOKEEPER-3794) upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200413 [GitHub] [zookeeper] phunt opened a new pull request #1319: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20200416 [GitHub] [pulsar] massakam opened a new pull request #6746: [build] Bump netty version to 4.1.48.Final
Source: MLIST Type: Mailing List, Third Party Advisory [flink-dev] 20200910 [jira] [Created] (FLINK-19195) question on security vulnerabilities in flink
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200414 [GitHub] [zookeeper] eolivelli commented on issue #1319: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-commits] 20200504 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612 - fixed file rename typo
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-dev] 20200413 [jira] [Created] (ZOOKEEPER-3794) upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20200415 [zookeeper] branch release-3.6.1 updated: ZOOKEEPER-3794: upgrade netty to address CVE-2020-11612
Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200904 [SECURITY] [DLA 2364-1] netty security update
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-66b5f85ccc
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20201223-0001/
Source: DEBIAN Type: Third Party Advisory DSA-4885
Source: CCN Type: IBM Security Bulletin 6216871 (Spectrum Scale) A vulnerability in netty affects IBM Spectrum Scale Transparent Cloud Tiering(CVE-2020-7238)
Source: CCN Type: IBM Security Bulletin 6256620 (Tivoli Netcool/OMNIbus) A vulnerability have been identified in Netty shipped with IBM Tivoli Netcool/OMNIbus Transport Module Common Integration Library (CVE-2020-11612)
Source: CCN Type: IBM Security Bulletin 6320057 (Security Guardium Insights) IBM Security Guardium Insights is affected by Components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6320059 (Security Guardium Insights) IBM Security Guardium Insights is affected by a Netty vulnerability
Source: CCN Type: IBM Security Bulletin 6323043 (Operations Analytics Predictive Insights) Vulnerability in Netty 4.1.x before 4.1.46 affects IBM Operations Analytics Predictive Insights (CVE-2020-11612)
Source: CCN Type: IBM Security Bulletin 6338535 (Cloud Private) IBM Cloud Private is vulnerable to a Netty vulnerability (CVE-2020-11612)
Source: CCN Type: IBM Security Bulletin 6339733 (Netcool Agile Service Manager) A vulnerability in Netty affects IBM Netcool Agile Service Manager
Source: CCN Type: IBM Security Bulletin 6403860 (MaaS360 Mobile Enterprise Gateway) IBM MaaS360 Mobile Enterprise Gateway vulnerable to denial of service (CVE-2020-11612)
Source: CCN Type: IBM Security Bulletin 6449284 (Watson Machine Learning Server on-prem) Netty security vulnerabilities with ZlibDecoders on IBM Watson Machine Learning Server
Source: CCN Type: IBM Security Bulletin 6466365 (DB2 for Linux, UNIX and Windows) Multiple vulnerabilities in dependent libraries affect IBM Db2 leading to denial of service or privilege escalation.
Source: CCN Type: IBM Security Bulletin 6520782 (Cloud Pak for Multicloud Management) IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Netty.io
Source: CCN Type: IBM Security Bulletin 6830983 (Sterling Order Management) IBM Sterling Order Management Netty 4.1.34 vulnerablity
Source: CCN Type: IBM Security Bulletin 6831849 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOPs
Source: N/A Type: Patch, Third Party Advisory N/A
Source: CCN Type: Oracle Critical Patch Update Advisory - April 2021 Oracle Critical Patch Update Advisory - April 2021
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuApr2021.html
Source: CCN Type: Oracle CPUApr2022 Oracle Critical Patch Update Advisory - April 2022
Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpuapr2022.html
Source: CCN Type: Oracle CPUJan2021 Oracle Critical Patch Update Advisory - January 2021
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2021.html
Source: CCN Type: Oracle CPUJul2021 Oracle Critical Patch Update Advisory - July 2021
|