ID

VAR-202102-1093


CVE

CVE-2021-27219


TITLE

GNOME Glib Security hole

Trust: 0.6

sources: CNNVD: CNNVD-202102-1181

DESCRIPTION

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption. Currently there is no information about this vulnerability. Please keep an eye on CNNVD or manufacturer announcements. Bugs fixed (https://bugzilla.redhat.com/): 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1945703 - "Guest OS Info" availability in VMI describe is flaky 1958816 - [2.6.z] KubeMacPool fails to start due to OOM likely caused by a high number of Pods running in the cluster 1963275 - migration controller null pointer dereference 1965099 - Live Migration double handoff to virt-handler causes connection failures 1965181 - CDI importer doesn't report AwaitingVDDK like it used to 1967086 - Cloning DataVolumes between namespaces fails while creating cdi-upload pod 1967887 - [2.6.6] nmstate is not progressing on a node and not configuring vlan filtering that causes an outage for VMs 1969756 - Windows VMs fail to start on air-gapped environments 1970372 - Virt-handler fails to verify container-disk 1973227 - segfault in virt-controller during pdb deletion 1974084 - 2.6.6 containers 1975212 - No Virtual Machine Templates Found [EDIT - all templates are marked as depracted] 1975727 - [Regression][VMIO][Warm] The third precopy does not end in warm migration 1977756 - [2.6.z] PVC keeps in pending when using hostpath-provisioner 1982760 - [v2v] no kind VirtualMachine is registered for version \"kubevirt.io/v1\" i... 1986989 - OpenShift Virtualization 2.6.z cannot be upgraded to 4.8.0 initially deployed starting with <= 4.8 5. 8) - noarch 3. The following packages have been upgraded to a later upstream version: mingw-glib2 (2.66.7). Description: Red Hat Advanced Cluster Management for Kubernetes 2.2.4 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.2/html/release_notes/ Security fixes: * redisgraph-tls: redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309) * console-header-container: nodejs-netmask: improper input validation of octal input data (CVE-2021-28092) * console-container: nodejs-is-svg: ReDoS via malicious string (CVE-2021-28918) Bug fixes: * RHACM 2.2.4 images (BZ# 1957254) * Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 (BZ#1950832) * ACM Operator should support using the default route TLS (BZ# 1955270) * The scrolling bar for search filter does not work properly (BZ# 1956852) * Limits on Length of MultiClusterObservability Resource Name (BZ# 1959426) * The proxy setup in install-config.yaml is not worked when IPI installing with RHACM (BZ# 1960181) * Unable to make SSH connection to a Bitbucket server (BZ# 1966513) * Observability Thanos store shard crashing - cannot unmarshall DNS message (BZ# 1967890) 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data 1950832 - Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 1952150 - [DDF] It would be great to see all the options available for the bucket configuration and which attributes are mandatory 1954506 - [DDF] Table does not contain data about 20 clusters. Now it's difficult to estimate CPU usage with larger clusters 1954535 - Reinstall Submariner - No endpoints found on one cluster 1955270 - ACM Operator should support using the default route TLS 1956852 - The scrolling bar for search filter does not work properly 1957254 - RHACM 2.2.4 images 1959426 - Limits on Length of MultiClusterObservability Resource Name 1960181 - The proxy setup in install-config.yaml is not worked when IPI installing with RHACM. 1963128 - [DDF] Please rename this to "Amazon Elastic Kubernetes Service" 1966513 - Unable to make SSH connection to a Bitbucket server 1967357 - [DDF] When I clicked on this yaml, I get a HTTP 404 error. 1967890 - Observability Thanos store shard crashing - cannot unmarshal DNS message 5. Description: Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers. Bug Fix(es): * WMCO patch pub-key-hash annotation to Linux node (BZ#1945248) * LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath (BZ#1952917) * Telemetry info not completely available to identify windows nodes (BZ#1955319) * WMCO incorrectly shows node as ready after a failed configuration (BZ#1956412) * kube-proxy service terminated unexpectedly after recreated LB service (BZ#1963263) 3. Solution: For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/4.7/windows_containers/window s-node-upgrades.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1945248 - WMCO patch pub-key-hash annotation to Linux node 1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM 1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath 1955319 - Telemetry info not completely available to identify windows nodes 1956412 - WMCO incorrectly shows node as ready after a failed configuration 1963263 - kube-proxy service terminated unexpectedly after recreated LB service 5. Bugs fixed (https://bugzilla.redhat.com/): 1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions 5. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202107-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: GLib: Multiple vulnerabilities Date: July 07, 2021 Bugs: #768753, #775632 ID: 202107-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in GLib, the worst of which could result in the arbitrary execution of code. Background ========== GLib is a library providing a number of GNOME's core objects and functions. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/glib < 2.66.8 >= 2.66.8 Description =========== Multiple vulnerabilities have been discovered in GLib. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All GLib users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.66.8" References ========== [ 1 ] CVE-2021-27218 https://nvd.nist.gov/vuln/detail/CVE-2021-27218 [ 2 ] CVE-2021-27219 https://nvd.nist.gov/vuln/detail/CVE-2021-27219 [ 3 ] CVE-2021-28153 https://nvd.nist.gov/vuln/detail/CVE-2021-28153 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202107-13 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . 8.2) - aarch64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: glib2 security update Advisory ID: RHSA-2021:2175-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2175 Issue date: 2021-06-01 CVE Names: CVE-2021-27219 ==================================================================== 1. Summary: An update for glib2 is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7) - noarch, x86_64 Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.7) - noarch, ppc64, ppc64le, s390x, x86_64 3. Description: GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.7): Source: glib2-2.56.1-6.el7_7.src.rpm x86_64: glib2-2.56.1-6.el7_7.i686.rpm glib2-2.56.1-6.el7_7.x86_64.rpm glib2-debuginfo-2.56.1-6.el7_7.i686.rpm glib2-debuginfo-2.56.1-6.el7_7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7): noarch: glib2-doc-2.56.1-6.el7_7.noarch.rpm x86_64: glib2-debuginfo-2.56.1-6.el7_7.i686.rpm glib2-debuginfo-2.56.1-6.el7_7.x86_64.rpm glib2-devel-2.56.1-6.el7_7.i686.rpm glib2-devel-2.56.1-6.el7_7.x86_64.rpm glib2-fam-2.56.1-6.el7_7.x86_64.rpm glib2-static-2.56.1-6.el7_7.i686.rpm glib2-static-2.56.1-6.el7_7.x86_64.rpm glib2-tests-2.56.1-6.el7_7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.7): Source: glib2-2.56.1-6.el7_7.src.rpm ppc64: glib2-2.56.1-6.el7_7.ppc.rpm glib2-2.56.1-6.el7_7.ppc64.rpm glib2-debuginfo-2.56.1-6.el7_7.ppc.rpm glib2-debuginfo-2.56.1-6.el7_7.ppc64.rpm glib2-devel-2.56.1-6.el7_7.ppc.rpm glib2-devel-2.56.1-6.el7_7.ppc64.rpm ppc64le: glib2-2.56.1-6.el7_7.ppc64le.rpm glib2-debuginfo-2.56.1-6.el7_7.ppc64le.rpm glib2-devel-2.56.1-6.el7_7.ppc64le.rpm s390x: glib2-2.56.1-6.el7_7.s390.rpm glib2-2.56.1-6.el7_7.s390x.rpm glib2-debuginfo-2.56.1-6.el7_7.s390.rpm glib2-debuginfo-2.56.1-6.el7_7.s390x.rpm glib2-devel-2.56.1-6.el7_7.s390.rpm glib2-devel-2.56.1-6.el7_7.s390x.rpm x86_64: glib2-2.56.1-6.el7_7.i686.rpm glib2-2.56.1-6.el7_7.x86_64.rpm glib2-debuginfo-2.56.1-6.el7_7.i686.rpm glib2-debuginfo-2.56.1-6.el7_7.x86_64.rpm glib2-devel-2.56.1-6.el7_7.i686.rpm glib2-devel-2.56.1-6.el7_7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.7): noarch: glib2-doc-2.56.1-6.el7_7.noarch.rpm ppc64: glib2-debuginfo-2.56.1-6.el7_7.ppc.rpm glib2-debuginfo-2.56.1-6.el7_7.ppc64.rpm glib2-fam-2.56.1-6.el7_7.ppc64.rpm glib2-static-2.56.1-6.el7_7.ppc.rpm glib2-static-2.56.1-6.el7_7.ppc64.rpm glib2-tests-2.56.1-6.el7_7.ppc64.rpm ppc64le: glib2-debuginfo-2.56.1-6.el7_7.ppc64le.rpm glib2-fam-2.56.1-6.el7_7.ppc64le.rpm glib2-static-2.56.1-6.el7_7.ppc64le.rpm glib2-tests-2.56.1-6.el7_7.ppc64le.rpm s390x: glib2-debuginfo-2.56.1-6.el7_7.s390.rpm glib2-debuginfo-2.56.1-6.el7_7.s390x.rpm glib2-fam-2.56.1-6.el7_7.s390x.rpm glib2-static-2.56.1-6.el7_7.s390.rpm glib2-static-2.56.1-6.el7_7.s390x.rpm glib2-tests-2.56.1-6.el7_7.s390x.rpm x86_64: glib2-debuginfo-2.56.1-6.el7_7.i686.rpm glib2-debuginfo-2.56.1-6.el7_7.x86_64.rpm glib2-fam-2.56.1-6.el7_7.x86_64.rpm glib2-static-2.56.1-6.el7_7.i686.rpm glib2-static-2.56.1-6.el7_7.x86_64.rpm glib2-tests-2.56.1-6.el7_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-27219 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYLYiBtzjgjWX9erEAQij2A//SOetrkuINJH1Ynug3uJzTj/eNbSqia1H Ys1upve8N1nTdfb1i41HLMn88KM5Hs9Lzb4Le3wnWOH4+ZIo/lr/SLDK8FNh3p0O izcBZHWSgbm91j0ESskQ1mICmy7/WWyQUXvRnf9vE+08syE7VWd4F0tbnnj5J0LR li4lNkToRZHVFadsLf0j3d5bpGYjnBGcgzinsBSxfTfbltORO75GtsKegJ0tTUUf a7YamRhIbdh3e29ngEH8TFS72vAvrvz17dcN0YVuOre2hIiJBGvQujfNrqrRQ5UN +Kx3HeqtrUscjhAnCups2zB+vxaGooGpy80YBuYZUFCzDpzq2U/ORcsk9vXXK7zU vEH1JOqfqLDR1f6ZCEyfR/pHUB+Mc5tpM7iVfLINdFUQPkSrKLUCQ8pFyZ8nhzD7 0MDlcVs27DueyV+7flstK9/Q/1uw5r+uigyPSNxPQciLnr3ph5/92bbk1VOGrmEQ vbJLkHmkKcU/uQBoi9D6fBq79cbB5zt49c37F8AJ5TUfXPQyrJST0624YWu/LbJH Mq7tS/TX0bAXGqWFa9i/lezTulFncUijYmb4PdIALpRrT7yLqWvUntPSy057KcuS Xt448tO9M0b2NRGNzrVM1Y3bOHrLPjdWVqmOFfD5FeOqvmSyRcivS1LEHSz3X1e4 yQ/lOQ5Qnvs=oS3p -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html For Red Hat OpenShift Logging 5.0, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u pgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 5

Trust: 1.89

sources: NVD: CVE-2021-27219 // VULHUB: VHN-386440 // VULMON: CVE-2021-27219 // PACKETSTORM: 163789 // PACKETSTORM: 164856 // PACKETSTORM: 163188 // PACKETSTORM: 163257 // PACKETSTORM: 163276 // PACKETSTORM: 163426 // PACKETSTORM: 162889 // PACKETSTORM: 162895 // PACKETSTORM: 163133

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:broadcommodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.67.3

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.66.6

Trust: 1.0

vendor:gnomemodel:glibscope:gteversion:2.67.0

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:e-series performance analyzerscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2021-27219

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27219
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202102-1181
value: HIGH

Trust: 0.6

VULHUB: VHN-386440
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-27219
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-27219
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-386440
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-27219
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-386440 // VULMON: CVE-2021-27219 // CNNVD: CNNVD-202102-1181 // NVD: CVE-2021-27219

PROBLEMTYPE DATA

problemtype:CWE-681

Trust: 1.1

sources: VULHUB: VHN-386440 // NVD: CVE-2021-27219

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202102-1181

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202102-1181

PATCH

title:GNOME Glib Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142631

Trust: 0.6

title:Amazon Linux AMI: ALAS-2021-1526url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1526

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1655url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1655

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-27219 log

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-27219

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2021-27219 // CNNVD: CNNVD-202102-1181

EXTERNAL IDS

db:NVDid:CVE-2021-27219

Trust: 2.7

db:PACKETSTORMid:164856

Trust: 0.8

db:PACKETSTORMid:163133

Trust: 0.8

db:PACKETSTORMid:163426

Trust: 0.8

db:PACKETSTORMid:161714

Trust: 0.7

db:PACKETSTORMid:162884

Trust: 0.7

db:PACKETSTORMid:163496

Trust: 0.7

db:PACKETSTORMid:162869

Trust: 0.7

db:PACKETSTORMid:163149

Trust: 0.7

db:PACKETSTORMid:163267

Trust: 0.7

db:PACKETSTORMid:162929

Trust: 0.7

db:AUSCERTid:ESB-2021.0896

Trust: 0.6

db:AUSCERTid:ESB-2021.3340

Trust: 0.6

db:AUSCERTid:ESB-2021.4083

Trust: 0.6

db:AUSCERTid:ESB-2021.0818

Trust: 0.6

db:AUSCERTid:ESB-2021.3019

Trust: 0.6

db:AUSCERTid:ESB-2021.2180

Trust: 0.6

db:AUSCERTid:ESB-2021.2711

Trust: 0.6

db:AUSCERTid:ESB-2022.2809

Trust: 0.6

db:AUSCERTid:ESB-2021.1922

Trust: 0.6

db:AUSCERTid:ESB-2021.2131

Trust: 0.6

db:AUSCERTid:ESB-2021.2365

Trust: 0.6

db:AUSCERTid:ESB-2021.3744

Trust: 0.6

db:AUSCERTid:ESB-2021.1856

Trust: 0.6

db:AUSCERTid:ESB-2021.2657

Trust: 0.6

db:AUSCERTid:ESB-2021.0994

Trust: 0.6

db:AUSCERTid:ESB-2021.0917

Trust: 0.6

db:AUSCERTid:ESB-2021.2228

Trust: 0.6

db:AUSCERTid:ESB-2021.2123

Trust: 0.6

db:CS-HELPid:SB2021070711

Trust: 0.6

db:CS-HELPid:SB2021060225

Trust: 0.6

db:CS-HELPid:SB2021062703

Trust: 0.6

db:CS-HELPid:SB2021053117

Trust: 0.6

db:CS-HELPid:SB2021090833

Trust: 0.6

db:CS-HELPid:SB2022011038

Trust: 0.6

db:CS-HELPid:SB2021111130

Trust: 0.6

db:CS-HELPid:SB2021071516

Trust: 0.6

db:CS-HELPid:SB2021061422

Trust: 0.6

db:CS-HELPid:SB2021122914

Trust: 0.6

db:CS-HELPid:SB2021092220

Trust: 0.6

db:CS-HELPid:SB2021062315

Trust: 0.6

db:PACKETSTORMid:164452

Trust: 0.6

db:CNNVDid:CNNVD-202102-1181

Trust: 0.6

db:PACKETSTORMid:163257

Trust: 0.2

db:PACKETSTORMid:162895

Trust: 0.2

db:PACKETSTORMid:162889

Trust: 0.2

db:PACKETSTORMid:163191

Trust: 0.1

db:PACKETSTORMid:162892

Trust: 0.1

db:PACKETSTORMid:162932

Trust: 0.1

db:PACKETSTORMid:162893

Trust: 0.1

db:PACKETSTORMid:163240

Trust: 0.1

db:PACKETSTORMid:162888

Trust: 0.1

db:PACKETSTORMid:163242

Trust: 0.1

db:VULHUBid:VHN-386440

Trust: 0.1

db:VULMONid:CVE-2021-27219

Trust: 0.1

db:PACKETSTORMid:163789

Trust: 0.1

db:PACKETSTORMid:163188

Trust: 0.1

db:PACKETSTORMid:163276

Trust: 0.1

sources: VULHUB: VHN-386440 // VULMON: CVE-2021-27219 // PACKETSTORM: 163789 // PACKETSTORM: 164856 // PACKETSTORM: 163188 // PACKETSTORM: 163257 // PACKETSTORM: 163276 // PACKETSTORM: 163426 // PACKETSTORM: 162889 // PACKETSTORM: 162895 // PACKETSTORM: 163133 // CNNVD: CNNVD-202102-1181 // NVD: CVE-2021-27219

REFERENCES

url:https://security.gentoo.org/glsa/202107-13

Trust: 1.9

url:https://security.netapp.com/advisory/ntap-20210319-0004/

Trust: 1.8

url:https://gitlab.gnome.org/gnome/glib/-/issues/2319

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-27219

Trust: 1.2

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3cdev.mina.apache.org%3e

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2021-27219

Trust: 0.8

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.8

url:https://bugzilla.redhat.com/):

Trust: 0.8

url:https://access.redhat.com/security/team/contact/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 0.7

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3cdev.mina.apache.org%3e

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2021.0818

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0917

Trust: 0.6

url:https://packetstormsecurity.com/files/162869/red-hat-security-advisory-2021-2147-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021111130

Trust: 0.6

url:https://packetstormsecurity.com/files/163149/red-hat-security-advisory-2021-2286-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162884/red-hat-security-advisory-2021-2172-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2657

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0994

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2711

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2809

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0896

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3744

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1922

Trust: 0.6

url:https://packetstormsecurity.com/files/163426/gentoo-linux-security-advisory-202107-13.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163133/red-hat-security-advisory-2021-2374-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2123

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070711

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2365

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2180

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060225

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122914

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4083

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6520674

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021053117

Trust: 0.6

url:https://packetstormsecurity.com/files/163496/red-hat-security-advisory-2021-2705-01.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6526532

Trust: 0.6

url:https://vigilance.fr/vulnerability/gnome-glib-integer-overflow-via-g-bytes-new-34776

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2228

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062703

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092220

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3019

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-glibc-vulnerability-affects-ibm-elastic-storage-system-cve-2021-27219/

Trust: 0.6

url:https://packetstormsecurity.com/files/161714/ubuntu-security-notice-usn-4759-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1856

Trust: 0.6

url:https://packetstormsecurity.com/files/163267/red-hat-security-advisory-2021-2532-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011038

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2131

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3340

Trust: 0.6

url:https://packetstormsecurity.com/files/164452/red-hat-security-advisory-2021-3748-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021061422

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021071516

Trust: 0.6

url:https://packetstormsecurity.com/files/162929/red-hat-security-advisory-2021-2203-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062315

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090833

Trust: 0.6

url:https://packetstormsecurity.com/files/164856/red-hat-security-advisory-2021-4526-03.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6518308

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-8286

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-28196

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-15358

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2017-14502

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-13434

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-8231

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-29362

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-13434

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2017-14502

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-8285

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-10228

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-9169

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-25013

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-29361

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-9169

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3326

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-25013

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-2708

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-8927

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-29363

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-2708

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2016-10228

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-8284

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-27618

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-26116

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-27619

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3177

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-23336

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3114

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-15358

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-13776

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-3842

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-13776

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24977

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-3842

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-25039

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12364

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25037

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25037

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-12363

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-28935

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25034

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25035

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14866

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25038

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14866

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26137

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25040

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25042

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25042

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-12362

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25038

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25032

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25041

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25036

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25032

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-25215

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25036

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25035

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12362

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12363

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25039

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-25040

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-12364

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25041

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-25034

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-27218

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-28362

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-29362

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8284

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20305

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-20305

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8285

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8286

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-27618

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8927

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-29363

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8231

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3449

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3450

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24977

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-29361

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-28196

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/681.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2021-27219

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://alas.aws.amazon.com/alas-2021-1526.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14347

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14346

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25712

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23240

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13543

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3520

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9951

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23239

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36242

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33909

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-32399

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9948

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13012

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14345

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13584

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13543

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14360

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13584

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3517

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3560

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20201

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25659

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3541

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3119

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25217

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9983

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14345

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14361

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28211

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13012

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14346

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33910

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4526

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21639

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28165

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28092

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10878

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24330

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28163

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21309

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21640

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28918

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24330

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3543

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3501

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25648

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8648

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27170

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24331

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25692

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-2433

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10543

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3347

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24332

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10878

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2461

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-25736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3450

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2130

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/windows_containers/window

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3326

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3449

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28500

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28500

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26116

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28362

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/jaeger/jaeger_install/rhb

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23336

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23337

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28153

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2171

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2175

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3121

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2374

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.1

sources: VULHUB: VHN-386440 // VULMON: CVE-2021-27219 // PACKETSTORM: 163789 // PACKETSTORM: 164856 // PACKETSTORM: 163188 // PACKETSTORM: 163257 // PACKETSTORM: 163276 // PACKETSTORM: 163426 // PACKETSTORM: 162889 // PACKETSTORM: 162895 // PACKETSTORM: 163133 // CNNVD: CNNVD-202102-1181 // NVD: CVE-2021-27219

CREDITS

Red Hat

Trust: 0.8

sources: PACKETSTORM: 163789 // PACKETSTORM: 164856 // PACKETSTORM: 163188 // PACKETSTORM: 163257 // PACKETSTORM: 163276 // PACKETSTORM: 162889 // PACKETSTORM: 162895 // PACKETSTORM: 163133

SOURCES

db:VULHUBid:VHN-386440
db:VULMONid:CVE-2021-27219
db:PACKETSTORMid:163789
db:PACKETSTORMid:164856
db:PACKETSTORMid:163188
db:PACKETSTORMid:163257
db:PACKETSTORMid:163276
db:PACKETSTORMid:163426
db:PACKETSTORMid:162889
db:PACKETSTORMid:162895
db:PACKETSTORMid:163133
db:CNNVDid:CNNVD-202102-1181
db:NVDid:CVE-2021-27219

LAST UPDATE DATE

2026-03-30T20:28:14.567000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-386440date:2022-12-07T00:00:00
db:VULMONid:CVE-2021-27219date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202102-1181date:2022-06-08T00:00:00
db:NVDid:CVE-2021-27219date:2024-11-21T05:57:37.410

SOURCES RELEASE DATE

db:VULHUBid:VHN-386440date:2021-02-15T00:00:00
db:VULMONid:CVE-2021-27219date:2021-02-15T00:00:00
db:PACKETSTORMid:163789date:2021-08-11T16:15:17
db:PACKETSTORMid:164856date:2021-11-10T17:07:39
db:PACKETSTORMid:163188date:2021-06-17T17:53:22
db:PACKETSTORMid:163257date:2021-06-23T15:44:15
db:PACKETSTORMid:163276date:2021-06-24T17:54:53
db:PACKETSTORMid:163426date:2021-07-07T16:09:05
db:PACKETSTORMid:162889date:2021-06-01T15:11:50
db:PACKETSTORMid:162895date:2021-06-01T15:14:05
db:PACKETSTORMid:163133date:2021-06-14T15:54:54
db:CNNVDid:CNNVD-202102-1181date:2021-02-15T00:00:00
db:NVDid:CVE-2021-27219date:2021-02-15T17:15:13.137