ID

VAR-202102-1092


CVE

CVE-2021-27218


TITLE

GNOME GLib  Vulnerability in conversion between numeric types in

Trust: 0.8

sources: JVNDB: JVNDB-2021-003856

DESCRIPTION

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation. GNOME GLib Is vulnerable to a conversion error between numeric types.Denial of service (DoS) It may be put into a state. Currently there is no information about this vulnerability. Please keep an eye on CNNVD or manufacturer announcements. Summary: An update is now available for Service Telemetry Framework 1.4 for RHEL 8. Description: Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. STF then transmits the information to a centralized, receiving Red Hat OpenShift Container Platform (OCP) deployment for storage, retrieval, and monitoring. Solution: The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References). Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/): 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 5. Description: Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management /2.11/html-single/installing_3scale/index 4. Bugs fixed (https://bugzilla.redhat.com/): 1869800 - CVE-2020-8911 aws/aws-sdk-go: CBC padding oracle issue in AWS S3 Crypto SDK for golang 1869801 - CVE-2020-8912 aws-sdk-go: In-band key negotiation issue in AWS S3 Crypto SDK for golang 1930083 - CVE-2021-3442 PT RHOAM: XSS in 3scale at various places 5. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202107-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: GLib: Multiple vulnerabilities Date: July 07, 2021 Bugs: #768753, #775632 ID: 202107-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in GLib, the worst of which could result in the arbitrary execution of code. Background ========== GLib is a library providing a number of GNOME's core objects and functions. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/glib < 2.66.8 >= 2.66.8 Description =========== Multiple vulnerabilities have been discovered in GLib. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All GLib users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.66.8" References ========== [ 1 ] CVE-2021-27218 https://nvd.nist.gov/vuln/detail/CVE-2021-27218 [ 2 ] CVE-2021-27219 https://nvd.nist.gov/vuln/detail/CVE-2021-27219 [ 3 ] CVE-2021-28153 https://nvd.nist.gov/vuln/detail/CVE-2021-28153 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202107-13 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2021:3263 Space precludes documenting all of the container images in this advisory. Bug Fix(es): * Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3 (BZ#1956462) * OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working (BZ#1971669) * [4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path" (BZ#1973766) * oc logs doesn't work with piepeline builds (BZ#1974264) * "provisioned registration errors" cannot be reported (BZ#1976924) * AWS Elastic IP permissions are incorrectly required (BZ#1981553) * Memory consumption (container_memory_rss) steadily growing for /system.slice/kubelet.service when FIPS enabled [ocp 4.7] (BZ#1981580) * Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit (BZ#1981775) * Size of the hostname was preventing proper DNS resolution of the worker node names (BZ#1983695) * (release-4.7) Insights status card shows nothing when 0 issues found (BZ#1986724) * drop-icmp pod blocks direct SSH access to cluster nodes (BZ#1988426) * Editing a Deployment drops annotations (BZ#1989642) * [Kuryr][4.7] Duplicated egress rule for service network in knp object (BZ#1990175) * Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route (BZ#1991445) * Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build (BZ#1992240) * alerts: SystemMemoryExceedsReservation triggers too quickly (BZ#1992687) * failed to start cri-o service due to /usr/libexec/crio/conmon is missing (BZ#1993386) * Thanos build failure: vendor/ ignored (BZ#1994123) * Ipv6 IP addresses are not accepted for whitelisting (BZ#1994645) * upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop (BZ#1994729) * linuxptp-daemon crash on 4.8 (BZ#1995579) * long living clusters may fail to upgrade because of an invalid conmon path (BZ#1995810) For more details about the security issue(s), refer to the CVE page(s) listed in the References section. You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-x86_64 The image digest is sha256:b3f38d58057a12b0477bf28971390db3e3391ce1af8ac06e35d0aa9e8d8e5966 (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-s390x The image digest is sha256:30c2011f6d84b16960b981a07558f96a55e59a281449d25c5ccc778aaeb2f970 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-ppc64le The image digest is sha256:52ebf0db5a36434357c24a64863025730d2159a94997333f15fbe1444fa88f4f Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor 3. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1863446 - [Assisted-4.5-M2] clean all does not remove ConfigMaps and PVC 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1956462 - Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3 1971669 - OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working 1973766 - [4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path" 1974264 - oc logs doesn't work with piepeline builds 1976924 - "provisioned registration errors" cannot be reported 1981553 - AWS Elastic IP permissions are incorrectly required 1981775 - Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit 1983695 - Size of the hostname was preventing proper DNS resolution of the worker node names 1986724 - (release-4.7) Insights status card shows nothing when 0 issues found 1988426 - drop-icmp pod blocks direct SSH access to cluster nodes 1989642 - Editing a Deployment drops annotations 1990175 - [Kuryr][4.7] Duplicated egress rule for service network in knp object 1991445 - Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route 1992240 - Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build 1992687 - alerts: SystemMemoryExceedsReservation triggers too quickly 1993386 - failed to start cri-o service due to /usr/libexec/crio/conmon is missing 1994123 - Thanos build failure: vendor/ ignored 1994645 - Ipv6 IP addresses are not accepted for whitelisting 1994729 - upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop 1995810 - long living clusters may fail to upgrade because of an invalid conmon path 1998112 - Networking issue with vSphere clusters running HW14 and later 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: ACS 3.64 security and enhancement update Advisory ID: RHSA-2021:3146-01 Product: RHACS Advisory URL: https://access.redhat.com/errata/RHSA-2021:3146 Issue date: 2021-08-11 CVE Names: CVE-2021-27218 CVE-2021-33195 CVE-2021-33197 CVE-2021-33198 CVE-2021-34558 ==================================================================== 1. Summary: Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). * Red Hat Product Security has rated this update as having a "Moderate" security impact. * A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the references section. 2. Description: New Features The release of RHACS 3.64 provides the following new features: 1. You can now use deployment and namespace annotations to define where RHACS sends the violation notifications when configuring your notifiers such as Slack, Microsoft Teams, Email, and others. 2. The Red Hat Advanced Cluster Security Operator now supports the ability to allow users to set the enforcement behavior of the admission controller as part of their custom resource. 3. RHACS now supports kernel modules for Ubuntu 16.04 LTS with extended security maintenance (ESM). Security Fixes The release of RHACS 3.64 provides the following security fixes: * golang: `net` lookup functions may return invalid hostnames (CVE-2021-33195) * golang: `net/http/httputil` ReverseProxy forwards connection headers if the first one is empty (CVE-2021-33197) * golang: `math/big.Rat` may cause panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198) * golang: `crypto/tls` certificate of the wrong type is causing TLS client to panic (CVE-2021-34558) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages in the references section. System changes The release of RHACS 3.64 includes the following system changes: 1. RHACS now pre-fixes the optional security context constraint name with `stackrox` to avoid global naming conflicts. 2. Previously, violations for `port forwards` and `exec` events did not contain information about the user who performed the action that generated the events. The violations now include the user context. 3. The cluster init bundles contain the secrets required for internal RHACS services to communicate with each other. You can delete these to rotate secrets, which have previously sometimes caused outages. This update includes a new deletion workflow that warns about the possible impact of deletion on your environment. 4. The OpenShift compliance operator uses `rpm` only for querying, and it does not install any packages. Therefore, this update includes a policy exception for this pod by default to reduce the violations count. 3. Solution: To take advantage of these new features and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.64 4. Bugs fixed (https://bugzilla.redhat.com/): 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names 1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty 1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents 5. JIRA issues fixed (https://issues.jboss.org/): RHACS-25 - Release RHACS 3.64 6. References: https://access.redhat.com/security/cve/CVE-2021-27218 https://access.redhat.com/security/cve/CVE-2021-33195 https://access.redhat.com/security/cve/CVE-2021-33197 https://access.redhat.com/security/cve/CVE-2021-33198 https://access.redhat.com/security/cve/CVE-2021-34558 https://docs.openshift.com/acs/release_notes/364-release-notes.html https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYRR/dtzjgjWX9erEAQiwMg/8DLRIyhV+QWOxDgfkSsEB7xtCZGtXtaFG xj8HX+yxGvYOCZVLNK+6CR2qhr8MI28QtU4UFhO6WlbyEByVVq6tNJV6Db/ismsX 6+JTK18O+EGEjVK4dhnuvv9+u/155X6UXe60gZxcOmHI/tIiqf7Tz4TmKMsXb02R OPpgOBOEtEEbn9HiJJ9LXiaDyjKB1vSkgLv0RS4M2nvHq9XVUjLPaBq2uroSlCYr Xcne7F2mtEkltGfL3Za4hEaywSZBD0rJe0a5GS/91m3s4SgQvFTs5g4+suBxSjFG AaLpRfMuhWxpgQqYCtTswvUcMi3wsrbNgDtZN3atRruo6RlLCVVpcrDlGRD5/fxn G2YMeSg0WAJhQdU93OYpyGBdhoVdkITjqCV0TsUSDQp77gxfiZ3f+eCybxiCmeil Apb4CypEPucVBzfEi9cCJyNxQLM4p8vzCOF0qS4xiRA9ZDrwvRbdZcjsxKhczLIb gAxLesiu7tfCqLT8Yy4CqCaMlEhSS049jhj6jzlWzRmO0rgpGQfWD1hIlixV+3Xh 4URAmkmE5CRHs6kc6tT4XIS4XcAzn3TvVrMw8yo+bZFGzFMqIvYmhBxaUyYIWdZN /5zbh8OBC2KCqHyQAcL11qnid+o2cnl4mZs+gSwqOGxx8nqKrHPtnTaa2ZMXodJI QjlOAcComy8=OnA7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat OpenShift Serverless 1.17.0 release of the OpenShift Serverless Operator. This has been fixed (CVE-2021-3703)

Trust: 2.43

sources: NVD: CVE-2021-27218 // JVNDB: JVNDB-2021-003856 // VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // PACKETSTORM: 168011 // PACKETSTORM: 164511 // PACKETSTORM: 163957 // PACKETSTORM: 163426 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164192

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.66.7

Trust: 1.0

vendor:broadcommodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.67.4

Trust: 1.0

vendor:gnomemodel:glibscope:gteversion:2.67.0

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:e-series performance analyzerscope:eqversion: -

Trust: 1.0

vendor:gnomemodel:glibscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-003856 // NVD: CVE-2021-27218

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27218
value: HIGH

Trust: 1.0

NVD: CVE-2021-27218
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202102-1182
value: HIGH

Trust: 0.6

VULHUB: VHN-386439
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-27218
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-27218
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-386439
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-27218
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-27218
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // CNNVD: CNNVD-202102-1182 // JVNDB: JVNDB-2021-003856 // NVD: CVE-2021-27218

PROBLEMTYPE DATA

problemtype:CWE-681

Trust: 1.1

problemtype:Incorrect conversion between numeric types (CWE-681) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-386439 // JVNDB: JVNDB-2021-003856 // NVD: CVE-2021-27218

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 168011 // CNNVD: CNNVD-202102-1182

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202102-1182

PATCH

title:gbytearrayurl:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/

Trust: 0.8

title:GNOME Glib Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142632

Trust: 0.6

title:Amazon Linux 2: ALAS2-2021-1711url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1711

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-27218 log

Trust: 0.1

title:Red Hat: Important: Service Telemetry Framework 1.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225924 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.10.3 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220056 - Security Advisory

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-27218

Trust: 0.1

sources: VULMON: CVE-2021-27218 // CNNVD: CNNVD-202102-1182 // JVNDB: JVNDB-2021-003856

EXTERNAL IDS

db:NVDid:CVE-2021-27218

Trust: 3.3

db:PACKETSTORMid:163426

Trust: 0.8

db:JVNDBid:JVNDB-2021-003856

Trust: 0.8

db:PACKETSTORMid:165099

Trust: 0.7

db:PACKETSTORMid:164856

Trust: 0.7

db:PACKETSTORMid:161714

Trust: 0.7

db:PACKETSTORMid:164511

Trust: 0.7

db:PACKETSTORMid:163957

Trust: 0.7

db:PACKETSTORMid:164028

Trust: 0.7

db:PACKETSTORMid:163806

Trust: 0.7

db:PACKETSTORMid:164192

Trust: 0.7

db:AUSCERTid:ESB-2021.0896

Trust: 0.6

db:AUSCERTid:ESB-2021.3168

Trust: 0.6

db:AUSCERTid:ESB-2021.2959

Trust: 0.6

db:AUSCERTid:ESB-2021.0818

Trust: 0.6

db:AUSCERTid:ESB-2021.2736

Trust: 0.6

db:AUSCERTid:ESB-2021.0994

Trust: 0.6

db:AUSCERTid:ESB-2021.3141

Trust: 0.6

db:AUSCERTid:ESB-2022.2809

Trust: 0.6

db:AUSCERTid:ESB-2021.3015

Trust: 0.6

db:AUSCERTid:ESB-2021.3427

Trust: 0.6

db:AUSCERTid:ESB-2022.1025

Trust: 0.6

db:AUSCERTid:ESB-2021.0917

Trust: 0.6

db:AUSCERTid:ESB-2021.2722

Trust: 0.6

db:AUSCERTid:ESB-2022.1837

Trust: 0.6

db:AUSCERTid:ESB-2021.2897

Trust: 0.6

db:AUSCERTid:ESB-2021.3744

Trust: 0.6

db:CS-HELPid:SB2021070711

Trust: 0.6

db:CS-HELPid:SB2021101001

Trust: 0.6

db:CS-HELPid:SB2021111130

Trust: 0.6

db:CS-HELPid:SB2022011038

Trust: 0.6

db:CS-HELPid:SB2021090126

Trust: 0.6

db:CS-HELPid:SB2021122914

Trust: 0.6

db:CS-HELPid:SB2021092209

Trust: 0.6

db:PACKETSTORMid:164223

Trust: 0.6

db:PACKETSTORMid:164076

Trust: 0.6

db:PACKETSTORMid:163771

Trust: 0.6

db:CNNVDid:CNNVD-202102-1182

Trust: 0.6

db:VULHUBid:VHN-386439

Trust: 0.1

db:VULMONid:CVE-2021-27218

Trust: 0.1

db:PACKETSTORMid:168011

Trust: 0.1

sources: VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // PACKETSTORM: 168011 // PACKETSTORM: 164511 // PACKETSTORM: 163957 // PACKETSTORM: 163426 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164192 // CNNVD: CNNVD-202102-1182 // JVNDB: JVNDB-2021-003856 // NVD: CVE-2021-27218

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-27218

Trust: 2.0

url:https://security.gentoo.org/glsa/202107-13

Trust: 1.9

url:https://security.netapp.com/advisory/ntap-20210319-0004/

Trust: 1.8

url:https://gitlab.gnome.org/gnome/glib/-/merge_requests/1942

Trust: 1.8

url:https://gitlab.gnome.org/gnome/glib/-/merge_requests/1944

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html

Trust: 1.8

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3cdev.mina.apache.org%3e

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 1.1

url:https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3cissues.bookkeeper.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3cissues.bookkeeper.apache.org%3e

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 0.7

url:https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3cissues.bookkeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3cissues.bookkeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3cdev.mina.apache.org%3e

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0818

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0917

Trust: 0.6

url:https://packetstormsecurity.com/files/164192/red-hat-security-advisory-2021-3556-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021111130

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3427

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0994

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2809

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0896

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2897

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3744

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2959

Trust: 0.6

url:https://packetstormsecurity.com/files/164028/red-hat-security-advisory-2021-3262-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163806/red-hat-security-advisory-2021-3146-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2736

Trust: 0.6

url:https://vigilance.fr/vulnerability/gnome-glib-integer-overflow-via-g-byte-array-new-take-34775

Trust: 0.6

url:https://packetstormsecurity.com/files/163426/gentoo-linux-security-advisory-202107-13.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090126

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3015

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092209

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070711

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122914

Trust: 0.6

url:https://packetstormsecurity.com/files/164223/red-hat-security-advisory-2021-3598-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1025

Trust: 0.6

url:https://packetstormsecurity.com/files/164511/red-hat-security-advisory-2021-3851-01.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6526532

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2722

Trust: 0.6

url:https://packetstormsecurity.com/files/164076/red-hat-security-advisory-2021-3454-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161714/ubuntu-security-notice-usn-4759-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163771/red-hat-security-advisory-2021-3058-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/165099/red-hat-security-advisory-2021-4848-07.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011038

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3168

Trust: 0.6

url:https://packetstormsecurity.com/files/164856/red-hat-security-advisory-2021-4526-03.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6518308

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1837

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021101001

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3141

Trust: 0.6

url:https://packetstormsecurity.com/files/163957/red-hat-security-advisory-2021-3361-01.html

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3518

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3541

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3520

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3537

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3517

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3516

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-33195

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-34558

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-33197

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-33198

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33198

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33197

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33195

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-37750

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-14502

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-10228

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-27618

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-10228

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36222

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3326

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20305

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2017-14502

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-15358

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-29361

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-9169

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-29362

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-8927

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25013

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13434

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25013

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-29363

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-34558

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3609

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-20271

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22543

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-22555

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3121

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3609

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22555

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20271

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33196

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33196

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-22543

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/681.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2021-27218

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://alas.aws.amazon.com/al2/alas-2021-1711.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30761

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9952

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24407

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33930

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33929

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22947

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30666

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33928

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5924

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30762

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22922

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3653

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3442

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22924

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22922

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22924

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3442

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3653

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-36222

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3851

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21419

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22918

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3517

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/migration-toolkit-for-con

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25737

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3361

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21639

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-25735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21623

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-25737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21639

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21623

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21648

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3520

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25735

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22918

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3636

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21640

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21419

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3114

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21648

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21640

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3636

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27219

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3262

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2021:3263

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3146

Trust: 0.1

url:https://docs.openshift.com/acs/release_notes/364-release-notes.html

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27918

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8285

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27918

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3449

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8231

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31525

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2708

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-2708

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27618

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3556

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3326

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8286

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8927

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8285

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3421

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31525

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8286

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3703

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index

Trust: 0.1

sources: VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // PACKETSTORM: 168011 // PACKETSTORM: 164511 // PACKETSTORM: 163957 // PACKETSTORM: 163426 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164192 // CNNVD: CNNVD-202102-1182 // JVNDB: JVNDB-2021-003856 // NVD: CVE-2021-27218

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 168011 // PACKETSTORM: 164511 // PACKETSTORM: 163957 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164192

SOURCES

db:VULHUBid:VHN-386439
db:VULMONid:CVE-2021-27218
db:PACKETSTORMid:168011
db:PACKETSTORMid:164511
db:PACKETSTORMid:163957
db:PACKETSTORMid:163426
db:PACKETSTORMid:164028
db:PACKETSTORMid:163806
db:PACKETSTORMid:164192
db:CNNVDid:CNNVD-202102-1182
db:JVNDBid:JVNDB-2021-003856
db:NVDid:CVE-2021-27218

LAST UPDATE DATE

2026-02-06T20:18:14.899000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-386439date:2022-12-07T00:00:00
db:VULMONid:CVE-2021-27218date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202102-1182date:2022-06-08T00:00:00
db:JVNDBid:JVNDB-2021-003856date:2021-11-08T08:36:00
db:NVDid:CVE-2021-27218date:2024-11-21T05:57:37.240

SOURCES RELEASE DATE

db:VULHUBid:VHN-386439date:2021-02-15T00:00:00
db:VULMONid:CVE-2021-27218date:2021-02-15T00:00:00
db:PACKETSTORMid:168011date:2022-08-09T14:36:05
db:PACKETSTORMid:164511date:2021-10-14T15:19:59
db:PACKETSTORMid:163957date:2021-08-31T15:44:34
db:PACKETSTORMid:163426date:2021-07-07T16:09:05
db:PACKETSTORMid:164028date:2021-09-02T15:23:31
db:PACKETSTORMid:163806date:2021-08-12T15:48:34
db:PACKETSTORMid:164192date:2021-09-17T16:04:56
db:CNNVDid:CNNVD-202102-1182date:2021-02-15T00:00:00
db:JVNDBid:JVNDB-2021-003856date:2021-11-08T00:00:00
db:NVDid:CVE-2021-27218date:2021-02-15T17:15:13.073