ID

VAR-202103-1564


CVE

CVE-2021-21295


TITLE

Netty  In  HTTP  Request Smuggling Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-004681

DESCRIPTION

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`. Description: Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.3.7 security update on RHEL 6 Advisory ID: RHSA-2021:2046-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:2046 Issue date: 2021-05-19 CVE Names: CVE-2020-13936 CVE-2021-21290 CVE-2021-21295 ==================================================================== 1. Summary: A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.3 for RHEL 6 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.7 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * velocity: arbitrary code execution when attacker is able to modify templates (CVE-2020-13936) * netty: Information disclosure via the local system temporary directory (CVE-2021-21290) * netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. For details about how to apply this update, see: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory 1937364 - CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation 1937440 - CVE-2020-13936 velocity: arbitrary code execution when attacker is able to modify templates 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-20478 - (7.3.z) Upgrade artemis-wildfly-integration from 1.0.2 to 1.0.4 JBEAP-20868 - Tracker bug for the EAP 7.3.7 release for RHEL-6 JBEAP-20927 - [GSS](7.3.z) Upgrade weld from 3.1.4.Final to 3.1.6.Final and weld-api to 3.1.0.SP3 JBEAP-20935 - [GSS](7.3.z) Upgrade generic jms from 2.0.8.Final-redhat-00001 to 2.0.9.Final-redhat-00001 JBEAP-20940 - (7.3.z) Upgrade WildFly Elytron from 1.10.11.Final-redhat-00001 to 1.10.12.Final-redhat-00001 JBEAP-21093 - [GSS] (7.3.z) Upgrade undertow from 2.0.34.SP1-redhat-00001 to 2.0.35.SP1-redhat-00001 JBEAP-21094 - (7.3.z) Upgrade WildFly Core from 10.1.18.Final-redhat-00001 to 10.1.19.Final-redhat-00001 JBEAP-21095 - [GSS](7.3.z) Upgrade HAL from 3.2.13.Final-redhat-00001 to 3.2.14.Final-redhat-00001 JBEAP-21096 - (7.3.z) (Core) Upgrade xalan from 2.7.1.jbossorg-2 to 2.7.1.jbossorg-5 JBEAP-21121 - (7.3.z) Upgrade wildfly-http-client from 1.0.25.Final-redhat-00001 to 1.0.26.Final-redhat-00001 JBEAP-21185 - [GSS](7.3.z) ISPN-12807 - Simple cache does not update eviction statistics JBEAP-21186 - [GSS](7.3.z) Upgrade Infinispan from 9.4.19.Final-redhat-00001 to 9.4.22.Final-redhat-00001 JBEAP-21193 - (7.3.z) Upgrade RESTEasy from 3.11.3.Final-redhat-00001 to 3.11.4.Final-redhat-00001 JBEAP-21196 - [GSS](7.3.z) Upgrade JBoss Marshalling from 2.0.10.Final to 2.0.11.Final JBEAP-21203 - [GSS](7.3.z) Upgrade jgroups-kubernetes from 1.0.13.Final to 1.0.16.Final JBEAP-21262 - [GSS](7.3.z) Upgrade yasson from 1.0.5.redhat-00001 to 1.0.9.redhat-00001 JBEAP-21279 - (7.3.z) Upgrade xalan from 2.7.1.redhat-12 to 2.7.1.redhat-13 JBEAP-21312 - [GSS](7.3.z) Upgrade Ironjacamar from 1.4.27 to 1.4.30 JBEAP-21322 - [GSS](7.3.z) 7.3 Update 6 patch breaks samesite-cookie in Undertow JBEAP-21351 - (7.3.z) Upgrade WildFly Core from 10.1.19.Final-redhat-00001 to 10.1.20.Final-redhat-00001 JBEAP-21390 - (7.3.z) Upgrade Bouncy Castle from 1.68.0.redhat-00001 to 1.68.0.redhat-00005 JBEAP-21479 - (7.3.z) Upgrade mod_cluster from 1.4.3.Final-redhat-00001 to 1.4.3.Final-redhat-00002 7. Package List: Red Hat JBoss EAP 7.3 for RHEL 6 Server: Source: eap7-artemis-wildfly-integration-1.0.4-1.redhat_00001.1.el6eap.src.rpm eap7-bouncycastle-1.68.0-2.redhat_00005.1.el6eap.src.rpm eap7-hal-console-3.2.14-1.Final_redhat_00001.1.el6eap.src.rpm eap7-infinispan-9.4.22-3.Final_redhat_00001.1.el6eap.src.rpm eap7-ironjacamar-1.4.30-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-genericjms-2.0.9-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-marshalling-2.0.11-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-server-migration-1.7.2-6.Final_redhat_00007.1.el6eap.src.rpm eap7-jboss-weld-3.1-api-3.1.0-6.SP3_redhat_00001.1.el6eap.src.rpm eap7-jgroups-kubernetes-1.0.16-1.Final_redhat_00001.1.el6eap.src.rpm eap7-mod_cluster-1.4.3-2.Final_redhat_00002.1.el6eap.src.rpm eap7-netty-4.1.60-1.Final_redhat_00001.1.el6eap.src.rpm eap7-resteasy-3.11.4-1.Final_redhat_00001.1.el6eap.src.rpm eap7-undertow-2.0.35-1.SP1_redhat_00001.1.el6eap.src.rpm eap7-velocity-2.3.0-1.redhat_00001.1.el6eap.src.rpm eap7-weld-core-3.1.6-1.Final_redhat_00001.1.el6eap.src.rpm eap7-wildfly-7.3.7-1.GA_redhat_00002.1.el6eap.src.rpm eap7-wildfly-elytron-1.10.12-1.Final_redhat_00001.1.el6eap.src.rpm eap7-wildfly-http-client-1.0.26-1.Final_redhat_00001.1.el6eap.src.rpm eap7-xalan-j2-2.7.1-36.redhat_00013.1.el6eap.src.rpm eap7-yasson-1.0.9-1.redhat_00001.1.el6eap.src.rpm noarch: eap7-artemis-wildfly-integration-1.0.4-1.redhat_00001.1.el6eap.noarch.rpm eap7-bouncycastle-1.68.0-2.redhat_00005.1.el6eap.noarch.rpm eap7-bouncycastle-mail-1.68.0-2.redhat_00005.1.el6eap.noarch.rpm eap7-bouncycastle-pkix-1.68.0-2.redhat_00005.1.el6eap.noarch.rpm eap7-bouncycastle-prov-1.68.0-2.redhat_00005.1.el6eap.noarch.rpm eap7-hal-console-3.2.14-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-cachestore-jdbc-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-cachestore-remote-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-client-hotrod-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-commons-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-core-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-hibernate-cache-commons-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-hibernate-cache-spi-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-infinispan-hibernate-cache-v53-9.4.22-3.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-common-api-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-common-impl-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-common-spi-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-core-api-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-core-impl-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-deployers-common-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-jdbc-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-ironjacamar-validator-1.4.30-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-genericjms-2.0.9-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-marshalling-2.0.11-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-marshalling-river-2.0.11-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-server-migration-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-cli-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-core-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap6.4-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.0-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.1-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.2-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.3-server-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly10.0-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly10.1-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly11.0-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly12.0-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly13.0-server-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly14.0-server-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly15.0-server-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly16.0-server-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly17.0-server-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly18.0-server-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly8.2-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly9.0-1.7.2-6.Final_redhat_00007.1.el6eap.noarch.rpm eap7-jboss-weld-3.1-api-3.1.0-6.SP3_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-weld-3.1-api-weld-api-3.1.0-6.SP3_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-weld-3.1-api-weld-spi-3.1.0-6.SP3_redhat_00001.1.el6eap.noarch.rpm eap7-jgroups-kubernetes-1.0.16-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-mod_cluster-1.4.3-2.Final_redhat_00002.1.el6eap.noarch.rpm eap7-netty-4.1.60-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-netty-all-4.1.60-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-atom-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-cdi-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-client-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-client-microprofile-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-crypto-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jackson-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jackson2-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jaxb-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jaxrs-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jettison-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jose-jwt-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jsapi-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-json-binding-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-json-p-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-multipart-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-rxjava2-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-spring-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-validator-provider-11-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-yaml-provider-3.11.4-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-undertow-2.0.35-1.SP1_redhat_00001.1.el6eap.noarch.rpm eap7-velocity-2.3.0-1.redhat_00001.1.el6eap.noarch.rpm eap7-velocity-engine-core-2.3.0-1.redhat_00001.1.el6eap.noarch.rpm eap7-weld-core-3.1.6-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-weld-core-impl-3.1.6-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-weld-core-jsf-3.1.6-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-weld-ejb-3.1.6-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-weld-jta-3.1.6-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-weld-probe-core-3.1.6-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-weld-web-3.1.6-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-7.3.7-1.GA_redhat_00002.1.el6eap.noarch.rpm eap7-wildfly-elytron-1.10.12-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-elytron-tool-1.10.12-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-client-common-1.0.26-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-ejb-client-1.0.26-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-naming-client-1.0.26-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-transaction-client-1.0.26-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-javadocs-7.3.7-1.GA_redhat_00002.1.el6eap.noarch.rpm eap7-wildfly-modules-7.3.7-1.GA_redhat_00002.1.el6eap.noarch.rpm eap7-xalan-j2-2.7.1-36.redhat_00013.1.el6eap.noarch.rpm eap7-yasson-1.0.9-1.redhat_00001.1.el6eap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2020-13936 https://access.redhat.com/security/cve/CVE-2021-21290 https://access.redhat.com/security/cve/CVE-2021-21295 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/ 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYKUxIdzjgjWX9erEAQgmMw//UYg4rqfLDXCHqDnjS4gCI44QJZFprPMM Lxr6AKkdN41z2T3opq5DJPEdUsechKYIXQ6zeZLrTikkEJkEoVznTkKqymkDyWPi vUhcy3sN4RWPyoumbV817MdBMqyH4L6Fi8jPzmupp0CFq3ffuriHaVEEFVZojK76 DbasiebiwW1xrywNRna5iy5RBnUtdXNxXJ6XKHfXgfkz7BDq6mbGmzgYpS2dsUtp 0DqPOzRPRxjHitepswAVbL5q8BJE+C8Nhc7Dx+vVcVOfc2sP9lYouYATSeyJXQeW kwsCHBj8EEU8IuK/2461hCdhm9ZkO+69+TzNCKN+I+bp18bmE9ynvf7QKWk4y7QI J/UWOr//kWH4PPCvDbvNpcrsEp470w8+B80lYTprPCtMPX9uZ0M+DLRbsT6UgpQ8 NupomctFwFryoaQhggc+V8P8SVcVC9gfcjmhRzQS6zY0jj+5GwFK0X5ay6pwcfK2 KxNMds4hCRQfiJHXflT3bv5VREw3KDj9k27iNICX9TQcFOGDdK10y3iem5KjBpNB EUT4mtt05zZt4bcoOfUE1Q6zARM+egdG8UPcmlA9aTaf0dNyB54MC6oh8/oM7ol2 5MNKWweBDc9NBCbxLJfprLVoDxjS6cCkUx667M3H3ZuQ27FYSDvT81sLhTx2B2l0 1CBHAk3aI2k=HZpI -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat Data Grid is a distributed, in-memory data store. Solution: Refer to the Data Grid 8.2 Upgrade Guide for instructions on upgrading to this version. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link for the update. You must be logged in to download the update

Trust: 2.43

sources: NVD: CVE-2021-21295 // JVNDB: JVNDB-2021-004681 // VULHUB: VHN-379190 // VULMON: CVE-2021-21295 // PACKETSTORM: 163922 // PACKETSTORM: 162719 // PACKETSTORM: 162839 // PACKETSTORM: 162035 // PACKETSTORM: 164279 // PACKETSTORM: 164276 // PACKETSTORM: 164275

AFFECTED PRODUCTS

vendor:netappmodel:oncommand api servicesscope:eqversion: -

Trust: 1.0

vendor:nettymodel:nettyscope:ltversion:4.1.60

Trust: 1.0

vendor:apachemodel:kuduscope:ltversion:1.16.0

Trust: 1.0

vendor:oraclemodel:communications cloud native core policyscope:eqversion:1.14.0

Trust: 1.0

vendor:quarkusmodel:quarkusscope:lteversion:1.13.7

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:apachemodel:zookeeperscope:eqversion:3.5.9

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:the nettymodel:nettyscope: - version: -

Trust: 0.8

vendor:netappmodel:oncommand api servicesscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:quarkusmodel:quarkusscope: - version: -

Trust: 0.8

vendor:apachemodel:kuduscope: - version: -

Trust: 0.8

vendor:netappmodel:oncommand workflow automationscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-004681 // NVD: CVE-2021-21295

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-21295
value: MEDIUM

Trust: 1.0

security-advisories@github.com: CVE-2021-21295
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-21295
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202103-713
value: MEDIUM

Trust: 0.6

VULHUB: VHN-379190
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-21295
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-21295
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-379190
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-21295
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-004681
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-379190 // VULMON: CVE-2021-21295 // JVNDB: JVNDB-2021-004681 // CNNVD: CNNVD-202103-713 // NVD: CVE-2021-21295 // NVD: CVE-2021-21295

PROBLEMTYPE DATA

problemtype:CWE-444

Trust: 1.1

problemtype:HTTP Request Smuggling (CWE-444) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-379190 // JVNDB: JVNDB-2021-004681 // NVD: CVE-2021-21295

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202103-713

TYPE

environmental issue

Trust: 0.6

sources: CNNVD: CNNVD-202103-713

PATCH

title:Top Page The Netty projectGitHuburl:https://lists.apache.org/thread/qmvzmzm7lx43po0745qjymmmqzj1lmvp

Trust: 0.8

title:Netty Remediation measures for environmental problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=144007

Trust: 0.6

title:Debian CVElist Bug Report Logs: netty: CVE-2021-21295url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=3dae7308ddf952db0ad410f80e658793

Trust: 0.1

title:Debian CVElist Bug Report Logs: netty: CVE-2021-21409url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=23e6ecb2c9e3ae264a6a904e00c922b4

Trust: 0.1

title:Red Hat: CVE-2021-21295url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-21295

Trust: 0.1

title:Debian Security Advisories: DSA-4885-1 netty -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=b857eb63eda3549d92d4cef6b191afe6

Trust: 0.1

title:Red Hat: Moderate: Satellite 6.11 Releaseurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225498 - Security Advisory

Trust: 0.1

title:CVE-2021-21295url:https://github.com/PwnCast/CVE-2021-21295

Trust: 0.1

title:CVE-2021-21295url:https://github.com/AlAIAL90/CVE-2021-21295

Trust: 0.1

title:CVE-2021-21295url:https://github.com/AIPOCAI/CVE-2021-21295

Trust: 0.1

title:CVE-2021-21409url:https://github.com/AlAIAL90/CVE-2021-21409

Trust: 0.1

title:test.mdurl:https://github.com/AwesomeAlpha/test.md

Trust: 0.1

sources: VULMON: CVE-2021-21295 // JVNDB: JVNDB-2021-004681 // CNNVD: CNNVD-202103-713

EXTERNAL IDS

db:NVDid:CVE-2021-21295

Trust: 3.3

db:PACKETSTORMid:162839

Trust: 0.8

db:JVNDBid:JVNDB-2021-004681

Trust: 0.8

db:PACKETSTORMid:167709

Trust: 0.7

db:PACKETSTORMid:162490

Trust: 0.7

db:PACKETSTORMid:163517

Trust: 0.7

db:PACKETSTORMid:163477

Trust: 0.7

db:PACKETSTORMid:163922

Trust: 0.7

db:PACKETSTORMid:162035

Trust: 0.7

db:PACKETSTORMid:164279

Trust: 0.7

db:CS-HELPid:SB2021081922

Trust: 0.6

db:CS-HELPid:SB2021050706

Trust: 0.6

db:CS-HELPid:SB2021100302

Trust: 0.6

db:CS-HELPid:SB2021071219

Trust: 0.6

db:PACKETSTORMid:164346

Trust: 0.6

db:PACKETSTORMid:162714

Trust: 0.6

db:PACKETSTORMid:164566

Trust: 0.6

db:PACKETSTORMid:165294

Trust: 0.6

db:PACKETSTORMid:162732

Trust: 0.6

db:AUSCERTid:ESB-2021.1821

Trust: 0.6

db:AUSCERTid:ESB-2021.1108

Trust: 0.6

db:AUSCERTid:ESB-2021.2896

Trust: 0.6

db:AUSCERTid:ESB-2021.4253

Trust: 0.6

db:AUSCERTid:ESB-2021.1144

Trust: 0.6

db:AUSCERTid:ESB-2021.3495

Trust: 0.6

db:AUSCERTid:ESB-2022.3282

Trust: 0.6

db:AUSCERTid:ESB-2021.3208

Trust: 0.6

db:AUSCERTid:ESB-2021.1755

Trust: 0.6

db:AUSCERTid:ESB-2021.3284

Trust: 0.6

db:AUSCERTid:ESB-2021.2357

Trust: 0.6

db:AUSCERTid:ESB-2021.2416

Trust: 0.6

db:AUSCERTid:ESB-2021.1571

Trust: 0.6

db:CNNVDid:CNNVD-202103-713

Trust: 0.6

db:PACKETSTORMid:163489

Trust: 0.1

db:PACKETSTORMid:163423

Trust: 0.1

db:PACKETSTORMid:163483

Trust: 0.1

db:PACKETSTORMid:163485

Trust: 0.1

db:PACKETSTORMid:163480

Trust: 0.1

db:CNNVDid:CNNVD-202103-1685

Trust: 0.1

db:VULHUBid:VHN-379190

Trust: 0.1

db:VULMONid:CVE-2021-21295

Trust: 0.1

db:PACKETSTORMid:162719

Trust: 0.1

db:PACKETSTORMid:164276

Trust: 0.1

db:PACKETSTORMid:164275

Trust: 0.1

sources: VULHUB: VHN-379190 // VULMON: CVE-2021-21295 // JVNDB: JVNDB-2021-004681 // PACKETSTORM: 163922 // PACKETSTORM: 162719 // PACKETSTORM: 162839 // PACKETSTORM: 162035 // PACKETSTORM: 164279 // PACKETSTORM: 164276 // PACKETSTORM: 164275 // CNNVD: CNNVD-202103-713 // NVD: CVE-2021-21295

REFERENCES

url:https://github.com/netflix/zuul/pull/980

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-21295

Trust: 2.1

url:https://security.netapp.com/advisory/ntap-20210604-0003/

Trust: 1.8

url:https://www.debian.org/security/2021/dsa-4885

Trust: 1.8

url:https://github.com/netty/netty/security/advisories/ghsa-wm47-8v5p-wjpj

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.8

url:https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4

Trust: 1.7

url:https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb%40%3cissues.kudu.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969%40%3cjira.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f%40%3cjira.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c%40%3cissues.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48%40%3ccommits.pulsar.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5%40%3cdev.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e%40%3cissues.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc%40%3cjira.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5%40%3cissues.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700%40%3cjira.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890%40%3cissues.bookkeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071%40%3ccommits.pulsar.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904%40%3cdev.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d%40%3cissues.kudu.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898%40%3cdev.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc%40%3cissues.kudu.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d%40%3ccommits.pulsar.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41%40%3cjira.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c%40%3cdev.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3%40%3cdev.jackrabbit.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4%40%3cdev.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a%40%3ccommits.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3%40%3cissues.kudu.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a%40%3cissues.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324%40%3cissues.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b%40%3cissues.kudu.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b%40%3ccommits.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f%40%3cdev.ranger.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f%40%3cjira.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8%40%3ccommits.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd%40%3cdev.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e%40%3cissues.flink.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523%40%3cjira.kafka.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb%40%3cissues.hbase.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1%40%3ccommits.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5%40%3cdev.ranger.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675%40%3cnotifications.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87%40%3cissues.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325%40%3ccommits.pulsar.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468%40%3ccommits.servicecomb.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c%40%3ccommits.zookeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3cdev.flink.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3cissues.flink.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3cissues.flink.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3cissues.flink.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3cissues.flink.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3cissues.flink.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3cissues.flink.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3cissues.kudu.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3cissues.kudu.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3cissues.kudu.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3cissues.kudu.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3cissues.kudu.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3ccommits.pulsar.apache.org%3e

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-21295

Trust: 0.8

url:https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3cdev.ranger.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3cdev.ranger.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3ccommits.pulsar.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3ccommits.pulsar.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3ccommits.pulsar.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3cissues.bookkeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3cjira.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3cdev.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3cdev.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3cjira.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3cjira.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3cjira.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3ccommits.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3ccommits.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3ccommits.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3ccommits.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3cdev.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3cjira.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3cjira.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3ccommits.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3cdev.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3cjira.kafka.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3cissues.hbase.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3@%3cdev.jackrabbit.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3ccommits.servicecomb.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3cissues.zookeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3cdev.zookeeper.apache.org%3e

Trust: 0.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-netty-2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2416

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3208

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1821

Trust: 0.6

url:https://packetstormsecurity.com/files/163517/red-hat-security-advisory-2021-2755-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1108

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1571

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3495

Trust: 0.6

url:https://packetstormsecurity.com/files/167709/red-hat-security-advisory-2022-5498-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3282

Trust: 0.6

url:https://packetstormsecurity.com/files/165294/red-hat-security-advisory-2021-5134-05.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021050706

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6518930

Trust: 0.6

url:https://packetstormsecurity.com/files/163477/red-hat-security-advisory-2021-2689-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-have-been-identified-in-netty-shipped-with-ibm-tivoli-netcool-omnibus-transport-module-common-integration-library-cve-2021-21290-cve-2021-21295-cve-2021/

Trust: 0.6

url:https://packetstormsecurity.com/files/163922/red-hat-security-advisory-2021-3225-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021100302

Trust: 0.6

url:https://packetstormsecurity.com/files/162035/red-hat-security-advisory-2021-0943-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-netty-vulnerability-affects-ibm-watson-machine-learning-on-cp4d-cve-2021-21295/

Trust: 0.6

url:https://packetstormsecurity.com/files/164279/red-hat-security-advisory-2021-3660-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-netty-affects-ibm-spectrum-scale-transparent-cloud-tiercve-2021-21295/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021081922

Trust: 0.6

url:https://packetstormsecurity.com/files/162732/red-hat-security-advisory-2021-2070-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1755

Trust: 0.6

url:https://packetstormsecurity.com/files/162714/red-hat-security-advisory-2021-2051-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/164346/red-hat-security-advisory-2021-3700-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2357

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2896

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4253

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021071219

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1144

Trust: 0.6

url:https://packetstormsecurity.com/files/164566/red-hat-security-advisory-2021-3880-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162839/red-hat-security-advisory-2021-2139-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162490/red-hat-security-advisory-2021-1511-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3284

Trust: 0.6

url:https://vigilance.fr/vulnerability/netty-information-disclosure-via-content-length-header-34897

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-21409

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-21409

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-21290

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-29425

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-29425

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-21290

Trust: 0.4

url:https://issues.jboss.org/):

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-13936

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-13936

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3644

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3644

Trust: 0.3

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3536

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3597

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3536

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3597

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3690

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3690

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3642

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3642

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-28170

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-28170

Trust: 0.3

url:https://github.com/netty/netty/security/advisories/ghsa-f256-j965-7f32

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-21295

Trust: 0.1

url:https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432

Trust: 0.1

url:https://www.oracle.com//security-alerts/cpujul2021.html

Trust: 0.1

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 0.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 0.1

url:https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3cjira.kafka.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r61564d86a75403b854cdafee67fc69c8b88c5f6802c2c838f4282cc8@%3ccommits.pulsar.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rf38e4dcdefc7c59f7ba0799a399d6d6e37b555d406a1dfc2fcbf0b35@%3ccommits.pulsar.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r7879ddcb990c835c6b246654770d836f9d031dee982be836744e50ed@%3ccommits.pulsar.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rdd5715f3ee5e3216d5e0083a07994f67da6dbb9731ce9e7a6389b18e@%3ccommits.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r4a98827bb4a7edbd69ef862f2351391845697c40711820d10df52ca5@%3ccommits.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3ccommits.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rdd206d9dd7eb894cc089b37fe6edde2932de88d63a6d8368b44f5101@%3ccommits.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r9fe840c36b74f92b8d4a089ada1f9fd1d6293742efa18b10e06b66d2@%3ccommits.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r70c3a7bfa904f06a1902f4df20ee26e4f09a46b8fd3eb304dc57a2de@%3cdev.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/re9e6ed60941da831675de2f8f733c026757fb4fa28a7b6c9f3dfb575@%3cdev.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rcae42fba06979934208bbd515584b241d3ad01d1bb8b063512644362@%3cdev.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/ra66e93703e3f4bd31bdfd0b6fb0c32ae96b528259bb1aa2b6d38e401@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r2732aa3884cacfecac4c54cfaa77c279ba815cad44b464a567216f83@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r4b8be87acf5b9c098a2ee350b5ca5716fe7afeaf0a21a4ee45a90687@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r0ca82fec33334e571fe5b388272260778883e307e15415d7b1443de2@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r823d4b27fcba8dad5fe945bdefce3ca5a0031187966eb6ef3cc22ba9@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rac8cf45a1bab9ead5c9a860cbadd6faaeb7792203617b6ec3874736d@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rf521ff2be2e2dd38984174d3451e6ee935c845948845c8fccd86371d@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r1b3cb056364794f919aaf26ceaf7423de64e7fdd05a914066e7d5219@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/re39391adcb863f0e9f3f15e7986255948f263f02e4700b82453e7102@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rafc77f9f03031297394f3d372ccea751b23576f8a2ae9b6b053894c5@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/raa413040db6d2197593cc03edecfd168732e697119e6447b0a25d525@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rba2a9ef1d0af882ab58fadb336a58818495245dda43d32a7d7837187@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r6dac9bd799ceac499c7a7e152a9b0dc7f2fe7f89ec5605d129bb047b@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r9ec78dc409f3f1edff88f21cab53737f36aad46f582a9825389092e0@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r31044fb995e894749cb821c6fe56f487c16a97028e6e360e59f09d58@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r5f2f120b2b8d099226473db1832ffb4d7c1d6dc2d228a164bf293a8e@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r7b54563abebe3dbbe421e1ba075c2030d8d460372f8c79b7789684b6@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r967002f0939e69bdec58f070735a19dd57c1f2b8f817949ca17cddae@%3cissues.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r5cbea8614812289a9b98d0cfc54b47f54cef424ac98d5e315b791795@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/re4b0141939370304d676fe23774d0c6fbc584b648919825402d0cb39@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r101f82d8f3b5af0bf79aecbd5b2dd3b404f6bb51d1a54c2c3d29bed9@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/re1911e05c08f3ec2bab85744d788773519a0afb27272a31ac2a0b4e8@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rf148b2bf6c2754153a8629bc7495e216bd0bd4c915695486542a10b4@%3cnotifications.zookeeper.apache.org%3e

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/444.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984948

Trust: 0.1

url:https://github.com/pwncast/cve-2021-21295

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27568

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-34428

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18640

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28164

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3225

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28163

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28165

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28169

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18640

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28164

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-34428

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28169

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.amq.streams&version=1.8.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28163

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28165

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2046

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21350

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.2/html/upgrading_data_grid/

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product\xdata.grid&version=8.2

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21347

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21349

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21342

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21351

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21345

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26259

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21342

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26258

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21348

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31917

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10771

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31917

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21348

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21344

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21349

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2139

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21346

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21347

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21345

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21343

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21343

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21350

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21346

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21351

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26259

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product\xcatrhoar.eclipse.vertx&version=4.0.3

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.0/html/eclipse_vert.x_4.0_migration_guide/index

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.0/html/release_notes_for_eclipse_vert.x_4.0/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0943

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3660

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=appplatform&version=7.4

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3658

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3656

Trust: 0.1

sources: VULHUB: VHN-379190 // VULMON: CVE-2021-21295 // JVNDB: JVNDB-2021-004681 // PACKETSTORM: 163922 // PACKETSTORM: 162719 // PACKETSTORM: 162839 // PACKETSTORM: 162035 // PACKETSTORM: 164279 // PACKETSTORM: 164276 // PACKETSTORM: 164275 // CNNVD: CNNVD-202103-713 // NVD: CVE-2021-21295

CREDITS

Red Hat

Trust: 1.3

sources: PACKETSTORM: 163922 // PACKETSTORM: 162719 // PACKETSTORM: 162839 // PACKETSTORM: 162035 // PACKETSTORM: 164279 // PACKETSTORM: 164276 // PACKETSTORM: 164275 // CNNVD: CNNVD-202103-713

SOURCES

db:VULHUBid:VHN-379190
db:VULMONid:CVE-2021-21295
db:JVNDBid:JVNDB-2021-004681
db:PACKETSTORMid:163922
db:PACKETSTORMid:162719
db:PACKETSTORMid:162839
db:PACKETSTORMid:162035
db:PACKETSTORMid:164279
db:PACKETSTORMid:164276
db:PACKETSTORMid:164275
db:CNNVDid:CNNVD-202103-713
db:NVDid:CVE-2021-21295

LAST UPDATE DATE

2025-04-28T21:54:54.481000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-379190date:2022-05-12T00:00:00
db:VULMONid:CVE-2021-21295date:2022-05-12T00:00:00
db:JVNDBid:JVNDB-2021-004681date:2021-11-26T06:13:00
db:CNNVDid:CNNVD-202103-713date:2022-07-07T00:00:00
db:NVDid:CVE-2021-21295date:2024-11-21T05:47:57.530

SOURCES RELEASE DATE

db:VULHUBid:VHN-379190date:2021-03-30T00:00:00
db:VULMONid:CVE-2021-21295date:2021-03-09T00:00:00
db:JVNDBid:JVNDB-2021-004681date:2021-11-26T00:00:00
db:PACKETSTORMid:163922date:2021-08-31T15:08:05
db:PACKETSTORMid:162719date:2021-05-19T21:04:29
db:PACKETSTORMid:162839date:2021-05-27T13:30:24
db:PACKETSTORMid:162035date:2021-03-31T14:30:44
db:PACKETSTORMid:164279date:2021-09-24T15:46:14
db:PACKETSTORMid:164276date:2021-09-24T15:39:43
db:PACKETSTORMid:164275date:2021-09-24T15:39:14
db:CNNVDid:CNNVD-202103-713date:2021-03-09T00:00:00
db:NVDid:CVE-2021-21295date:2021-03-09T19:15:12.657