ID

VAR-202112-2255


CVE

CVE-2021-45485


TITLE

Linux Kernel  Vulnerability in using cryptographic algorithms in

Trust: 0.8

sources: JVNDB: JVNDB-2021-017434

DESCRIPTION

In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses. Linux Kernel Exists in the use of cryptographic algorithms.Information may be obtained. Description: Red Hat Advanced Cluster Management for Kubernetes 2.4.5 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/ Security fixes: * golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565) * nconf: Prototype pollution in memory store (CVE-2022-21803) * golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806) * nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450) * Moment.js: Path traversal in moment.locale (CVE-2022-24785) * dset: Prototype Pollution in dset (CVE-2022-25645) * golang: syscall: faccessat checks wrong group (CVE-2022-29526) * go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810) Bug fixes: * Trying to create a new cluster on vSphere and no feedback, stuck in "creating" (BZ# 1937078) * Wrong message is displayed when GRC fails to connect to an Ansible Tower (BZ# 2051752) * multicluster_operators_hub_subscription issues due to /tmp usage (BZ# 2052702) * Create Cluster, Worker Pool 2 zones do not load options that relate to the selected Region field (BZ# 2054954) * Changing the multiclusterhub name other than the default name keeps the version in the web console loading (BZ# 2059822) * search-redisgraph-0 generating massive amount of logs after 2.4.2 upgrade (BZ# 2065318) * Uninstall pod crashed when destroying Azure Gov cluster in ACM (BZ# 2073562) * Deprovisioned clusters not filtered out by discovery controller (BZ# 2075594) * When deleting a secret for a Helm application, duplicate errors show up in topology (BZ# 2075675) * Changing existing placement rules does not change YAML file Regression (BZ# 2075724) * Editing Helm Argo Applications does not Prune Old Resources (BZ# 2079906) * Failed to delete the requested resource [404] error appears after subscription is deleted and its placement rule is used in the second subscription (BZ# 2080713) * Typo in the logs when Deployable is updated in the subscription namespace (BZ# 2080960) * After Argo App Sets are created in an Upgraded Environment, the Clusters column does not indicate the clusters (BZ# 2080716) * RHACM 2.4.5 images (BZ# 2081438) * Performance issue to get secret in claim-controller (BZ# 2081908) * Failed to provision openshift 4.10 on bare metal (BZ# 2094109) 3. Bugs fixed (https://bugzilla.redhat.com/): 1937078 - Trying to create a new cluster on vSphere and no feedback, stuck in "creating" 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic 2051752 - Wrong message is displayed when GRC fails to connect to an ansible tower 2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account 2052702 - multicluster_operators_hub_subscription issues due to /tmp usage 2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements 2054954 - Create Cluster, Worker Pool 2 zones do not load options that relate to the selected Region field 2059822 - Changing the multiclusterhub name other than the default name keeps the version in the web console loading. 2065318 - search-redisgraph-0 generating massive amount of logs after 2.4.2 upgrade 2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale 2073562 - Uninstall pod crashed when destroying Azure Gov cluster in ACM 2074689 - CVE-2022-21803 nconf: Prototype pollution in memory store 2075594 - Deprovisioned clusters not filtered out by discovery controller 2075675 - When deleting a secret for a Helm application, duplicate errors show up in topology 2075724 - Changing existing placement rules does not change YAML file 2079906 - Editing Helm Argo Applications does not Prune Old Resources 2080279 - CVE-2022-29810 go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses 2080713 - Failed to delete the requested resource [404] error appears after subscription is deleted and it's placement rule is used in the second subscription [Upgrade] 2080716 - After Argo App Sets are created in an Upgraded Environment, the Clusters column does not indicate the clusters 2080847 - CVE-2022-25645 dset: Prototype Pollution in dset 2080960 - Typo in the logs when Deployable is updated in the subscription namespace 2081438 - RHACM 2.4.5 images 2081908 - Performance issue to get secret in claim-controller 2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group 2094109 - Failed to provision openshift 4.10 on bare metal 5. Relevant releases/architectures: Red Hat Enterprise Linux Real Time EUS (v.8.4) - x86_64 Red Hat Enterprise Linux Real Time for NFV EUS (v.8.4) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) * Information leak in the IPv6 implementation (CVE-2021-45485) * Information leak in the IPv4 implementation (CVE-2021-45486) * Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * update RT source tree to the RHEL-8.4.z12 source tree (BZ#2119160) * using __this_cpu_add() in preemptible [00000000] - caller is __mod_memcg_lruvec_state+0x69/0x1c0 [None8.4.0.z] (BZ#2124454) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. Bugs fixed (https://bugzilla.redhat.com/): 2039911 - CVE-2021-45485 kernel: information leak in the IPv6 implementation 2039914 - CVE-2021-45486 kernel: information leak in the IPv4 implementation 2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) 2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) 2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW) 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation 6. Package List: Red Hat Enterprise Linux Real Time for NFV EUS (v.8.4): Source: kernel-rt-4.18.0-305.65.1.rt7.137.el8_4.src.rpm x86_64: kernel-rt-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-core-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-core-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-devel-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-kvm-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-modules-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debuginfo-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-devel-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-kvm-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-modules-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-modules-extra-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm Red Hat Enterprise Linux Real Time EUS (v.8.4): Source: kernel-rt-4.18.0-305.65.1.rt7.137.el8_4.src.rpm x86_64: kernel-rt-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-core-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-core-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-devel-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-modules-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debuginfo-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-devel-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-modules-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm kernel-rt-modules-extra-4.18.0-305.65.1.rt7.137.el8_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.8.53 bug fix and security update Advisory ID: RHSA-2022:7874-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:7874 Issue date: 2022-11-18 CVE Names: CVE-2021-45485 CVE-2021-45486 CVE-2022-2588 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21618 CVE-2022-21619 CVE-2022-21624 CVE-2022-21626 CVE-2022-21628 CVE-2022-26945 CVE-2022-30321 CVE-2022-30322 CVE-2022-30323 CVE-2022-39399 CVE-2022-41974 ==================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.8.53 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.53. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2022:7873 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html Security Fix(es): * go-getter: command injection vulnerability (CVE-2022-26945) * go-getter: unsafe download (issue 1 of 3) (CVE-2022-30321) * go-getter: unsafe download (issue 2 of 3) (CVE-2022-30322) * go-getter: unsafe download (issue 3 of 3) (CVE-2022-30323) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.8 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, and ppc64le architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags The sha values for the release are: (For x86_64 architecture) The image digest is sha256:ac2bbfa7036c64bbdb44f9a74df3dbafcff1b851d812bf2a48c4fabcac3c7a53 (For s390x architecture) The image digest is sha256:ac2c74a664257cea299126d4f789cdf9a5a4efc4a4e8c2361b943374d4eb21e4 (For ppc64le architecture) The image digest is sha256:53adc42ed30ad39d7117837dbf5a6db6943a8f0b3b61bc0d046b83394f5c28b2 All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2077100 - Console backend check for Web Terminal Operator incorrectly returns HTTP 204 2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3) 2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3) 2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3) 2092928 - CVE-2022-26945 go-getter: command injection vulnerability 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-2205 - Prefer local dns does not work expectedly on OCPv4.8 OCPBUGS-2347 - [cluster-api-provider-baremetal] fix 4.8 build OCPBUGS-2577 - [4.8] ETCD Operator goes degraded when a second internal node ip is added OCPBUGS-2773 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name OCPBUGS-2989 - [4.8] cri-o should report the stage of container and pod creation it's stuck at 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY3csZNzjgjWX9erEAQgVQg//dfbbERoUaVbqbL5MAgN43BOuYuiK0zT2 wkUXSTkIyLGkEqCU6KGhwbrUvMqye1Fef7MomJ0sXUj1MfUuV4FInczZmioJf59d JAKdJQ8wEsqCaedwB+an5bVY6CEGdhsiN4a3JubKfGNkWcVOEr55acdgmu+n0hMJ 6zGQKgJLfBLPU7V/OG5zb/F2/GE6gwvqDsrrCMe6yZ7O2RTHDDnVI+bG1twhOjNb M/wxjxMc3KxAl/32EQXQQnDdicl8Fg3KSCLnVfKwQMfN3O9Fj5AFdW3kT27MKKrF DVsXTEeiLPvvUcfbu2KoLUqwXNajIDLNPYmwdWHrVZpOJcSSwDKxd3TRD1X8a5FO 2ZCpqk/InKz/mzhun+XSsyqY/KrevPFxiBzhfbPZE2EhBRXARUad4ycBlfSCacf9 wwFHEwPDzZ4NygYc1s+2dI9P5tDB+K21XB0d/41yq5XheYonBSu3Ji9+dqMIq/4R Hb+xisN5QoaB+3pf6PMIrhlvNestYQ4TzOHdmEpJRZOehIJ49bJXtIRXq6uDj52b 7gvzoKpRdy3QZNBLNcrJPB0be9yE8chRaxMa++fviQbNamJm3NPVL5jBzBNrEINr a9u8YMzpCzskWP3HdBUZ2bLT2zTnvb3Qj0vKQcUzO/hwl2z3hNbE2L+zOfXfWypj jBUti9NswAw=uJJL -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key 2130218 - 4.9.7 containers 5. ========================================================================== Ubuntu Security Notice USN-5299-1 February 22, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147) It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129) It was discovered that the RPA PCI Hotplug driver implementation in the Linux kernel did not properly handle device name writes via sysfs, leading to a buffer overflow. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33034) Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693) 马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3483) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564) Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612) It was discovered that the tracing subsystem in the Linux kernel did not properly keep track of per-cpu ring buffer state. A privileged attacker could use this to cause a denial of service. (CVE-2021-3679) It was discovered that the MAX-3421 host USB device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-38204) It was discovered that the 6pack network protocol driver in the Linux kernel did not properly perform validation checks. A privileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-42008) Amit Klein discovered that the IPv6 implementation in the Linux kernel could disclose internal state in some situations. An attacker could possibly use this to expose sensitive information. (CVE-2021-45485) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1100-kvm 4.4.0-1100.109 linux-image-4.4.0-1135-aws 4.4.0-1135.149 linux-image-4.4.0-219-generic 4.4.0-219.252 linux-image-4.4.0-219-lowlatency 4.4.0-219.252 linux-image-aws 4.4.0.1135.140 linux-image-generic 4.4.0.219.226 linux-image-kvm 4.4.0.1100.98 linux-image-lowlatency 4.4.0.219.226 linux-image-virtual 4.4.0.219.226 Ubuntu 14.04 ESM: linux-image-4.4.0-1099-aws 4.4.0-1099.104 linux-image-4.4.0-219-generic 4.4.0-219.252~14.04.1 linux-image-4.4.0-219-lowlatency 4.4.0-219.252~14.04.1 linux-image-aws 4.4.0.1099.97 linux-image-generic-lts-xenial 4.4.0.219.190 linux-image-lowlatency-lts-xenial 4.4.0.219.190 linux-image-virtual-lts-xenial 4.4.0.219.190 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5299-1 CVE-2020-26147, CVE-2020-26558, CVE-2021-0129, CVE-2021-28972, CVE-2021-33034, CVE-2021-34693, CVE-2021-3483, CVE-2021-3564, CVE-2021-3612, CVE-2021-3679, CVE-2021-38204, CVE-2021-42008, CVE-2021-45485 . Summary: The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/): 2007557 - CVE-2021-3807 nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes 2038898 - [UI] ?Update Repository? option not getting disabled after adding the Replication Repository details to the MTC web console 2040693 - ?Replication repository? wizard has no validation for name length 2040695 - [MTC UI] ?Add Cluster? wizard stucks when the cluster name length is more than 63 characters 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor 2048537 - Exposed route host to image registry? connecting successfully to invalid registry ?xyz.com? 2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak 2055658 - [MTC UI] Cancel button on ?Migrations? page does not disappear when migration gets Failed/Succeeded with warnings 2056962 - [MTC UI] UI shows the wrong migration type info after changing the target namespace 2058172 - [MTC UI] Successful Rollback is not showing the green success icon in the ?Last State? field. 2058529 - [MTC UI] Migrations Plan is missing the type for the state migration performed before upgrade 2061335 - [MTC UI] ?Update cluster? button is not getting disabled 2062266 - MTC UI does not display logs properly [OADP-BL] 2062862 - [MTC UI] Clusters page behaving unexpectedly on deleting the remote cluster?s service account secret from backend 2074675 - HPAs of DeploymentConfigs are not being updated when migration from Openshift 3.x to Openshift 4.x 2076593 - Velero pod log missing from UI drop down 2076599 - Velero pod log missing from downloaded logs folder [OADP-BL] 2078459 - [MTC UI] Storageclass conversion plan is adding migstorage reference in migplan 2079252 - [MTC] Rsync options logs not visible in log-reader pod 2082221 - Don't allow Storage class conversion migration if source cluster has only one storage class defined [UI] 2082225 - non-numeric user when launching stage pods [OADP-BL] 2088022 - Default CPU requests on Velero/Restic are too demanding making scheduling fail in certain environments 2088026 - Cloud propagation phase in migration controller is not doing anything due to missing labels on Velero pods 2089126 - [MTC] Migration controller cannot find Velero Pod because of wrong labels 2089411 - [MTC] Log reader pod is missing velero and restic pod logs [OADP-BL] 2089859 - [Crane] DPA CR is missing the required flag - Migration is getting failed at the EnsureCloudSecretPropagated phase due to the missing secret VolumeMounts 2090317 - [MTC] mig-operator failed to create a DPA CR due to null values are passed instead of int [OADP-BL] 2096939 - Fix legacy operator.yml inconsistencies and errors 2100486 - [MTC UI] Target storage class field is not getting respected when clusters don't have replication repo configured

Trust: 2.52

sources: NVD: CVE-2021-45485 // JVNDB: JVNDB-2021-017434 // VULHUB: VHN-409116 // VULMON: CVE-2021-45485 // PACKETSTORM: 167602 // PACKETSTORM: 169411 // PACKETSTORM: 167622 // PACKETSTORM: 167330 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // PACKETSTORM: 166101 // PACKETSTORM: 167679

AFFECTED PRODUCTS

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:netappmodel:fabric-attached storage 8700scope:eqversion: -

Trust: 1.0

vendor:netappmodel:solidfire\, enterprise sds \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:netappmodel:aff a400scope:eqversion: -

Trust: 1.0

vendor:netappmodel:all flash fabric-attached storage 8300scope:eqversion: -

Trust: 1.0

vendor:netappmodel:fabric-attached storage a400scope:eqversion: -

Trust: 1.0

vendor:netappmodel:solidfire \& hci management nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:h610cscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h615cscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core network exposure functionscope:eqversion:22.1.1

Trust: 1.0

vendor:oraclemodel:communications cloud native core binding support functionscope:eqversion:22.1.3

Trust: 1.0

vendor:netappmodel:h500escope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.13.3

Trust: 1.0

vendor:netappmodel:fabric-attached storage 8300scope:eqversion: -

Trust: 1.0

vendor:netappmodel:all flash fabric-attached storage 8700scope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300escope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h610sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h700escope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core policyscope:eqversion:22.2.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controller softwarescope: - version: -

Trust: 0.8

vendor:netappmodel:hci baseboard management controller h300escope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

vendor:netappmodel:fas/aff baseboard management controller a400scope: - version: -

Trust: 0.8

vendor:netappmodel:fas/aff baseboard management controller 8700scope: - version: -

Trust: 0.8

vendor:netappmodel:hci baseboard management controller h410cscope: - version: -

Trust: 0.8

vendor:netappmodel:solidfire enterprise sds & hci storage nodescope: - version: -

Trust: 0.8

vendor:netappmodel:solidfire & hci management nodescope: - version: -

Trust: 0.8

vendor:netappmodel:hci baseboard management controller h300sscope: - version: -

Trust: 0.8

vendor:netappmodel:fas/aff baseboard management controller 8300scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017434 // NVD: CVE-2021-45485

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45485
value: HIGH

Trust: 1.0

NVD: CVE-2021-45485
value: HIGH

Trust: 0.8

VULHUB: VHN-409116
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-45485
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45485
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-409116
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-45485
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-45485
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-409116 // VULMON: CVE-2021-45485 // JVNDB: JVNDB-2021-017434 // NVD: CVE-2021-45485

PROBLEMTYPE DATA

problemtype:CWE-327

Trust: 1.1

problemtype:Use of incomplete or dangerous cryptographic algorithms (CWE-327) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-409116 // JVNDB: JVNDB-2021-017434 // NVD: CVE-2021-45485

TYPE

code execution

Trust: 0.1

sources: PACKETSTORM: 169941

PATCH

title:NTAP-20220121-0001url:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3

Trust: 0.8

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20226983 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20226991 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Virtualization 4.9.7 Images security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20228609 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.8.53 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20227874 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.10.39 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20227211 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.9.51 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20227216 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: USN-5299-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5299-1

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221988 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224814 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225483 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225201 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224956 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225392 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: USN-5343-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5343-1

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title: - url:https://github.com/SYRTI/POC_to_review

Trust: 0.1

title: - url:https://github.com/trhacknon/Pocingit

Trust: 0.1

sources: VULMON: CVE-2021-45485 // JVNDB: JVNDB-2021-017434

EXTERNAL IDS

db:NVDid:CVE-2021-45485

Trust: 3.6

db:JVNDBid:JVNDB-2021-017434

Trust: 0.8

db:PACKETSTORMid:169941

Trust: 0.2

db:PACKETSTORMid:169997

Trust: 0.2

db:PACKETSTORMid:169695

Trust: 0.1

db:PACKETSTORMid:169719

Trust: 0.1

db:VULHUBid:VHN-409116

Trust: 0.1

db:VULMONid:CVE-2021-45485

Trust: 0.1

db:PACKETSTORMid:167602

Trust: 0.1

db:PACKETSTORMid:169411

Trust: 0.1

db:PACKETSTORMid:167622

Trust: 0.1

db:PACKETSTORMid:167330

Trust: 0.1

db:PACKETSTORMid:166101

Trust: 0.1

db:PACKETSTORMid:167679

Trust: 0.1

sources: VULHUB: VHN-409116 // VULMON: CVE-2021-45485 // JVNDB: JVNDB-2021-017434 // PACKETSTORM: 167602 // PACKETSTORM: 169411 // PACKETSTORM: 167622 // PACKETSTORM: 167330 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // PACKETSTORM: 166101 // PACKETSTORM: 167679 // NVD: CVE-2021-45485

REFERENCES

url:https://arxiv.org/pdf/2112.09604.pdf

Trust: 2.0

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 2.0

url:https://security.netapp.com/advisory/ntap-20220121-0001/

Trust: 1.2

url:https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.13.3

Trust: 1.2

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-45485

Trust: 1.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-3612

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-3752

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4157

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3744

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-13974

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-41617

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3773

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4002

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-29154

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-43976

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-0941

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-43389

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3634

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-27820

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4189

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-44733

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-21781

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3634

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4037

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-29154

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-37159

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-4788

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3772

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-0404

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3669

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3764

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-20322

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-43056

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-41864

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4197

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-0941

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3612

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-26401

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-27820

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3743

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3737

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-1011

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-13974

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-20322

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4083

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0322

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-4788

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-26401

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0286

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0001

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3759

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-21781

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0002

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4203

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-42739

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-0404

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-19131

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-19131

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-45486

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21166

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21166

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21123

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-2588

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21125

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21123

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21125

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2588

Trust: 0.3

url:https://ubuntu.com/security/notices/usn-5299-1

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3696

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-38185

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28733

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21803

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-29526

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28736

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3697

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28734

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-25219

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28737

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-25219

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3695

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28735

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-24785

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-23806

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-29810

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3669

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0235

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0536

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35492

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35492

Trust: 0.2

url:https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3807

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41974

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/327.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6983

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25645

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43565

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5201

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24450

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6991

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1708

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0492

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5392

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3773

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3764

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37159

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3759

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3744

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21626

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21626

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21628

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7874

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39399

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30321

Trust: 0.1

url:https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26945

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21618

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:7873

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21628

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30323

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26945

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40674

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40674

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41974

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8609

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3515

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3515

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33034

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3564

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3679

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-42008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28972

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-34693

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26691

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5483

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.1

sources: VULHUB: VHN-409116 // VULMON: CVE-2021-45485 // JVNDB: JVNDB-2021-017434 // PACKETSTORM: 167602 // PACKETSTORM: 169411 // PACKETSTORM: 167622 // PACKETSTORM: 167330 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // PACKETSTORM: 166101 // PACKETSTORM: 167679 // NVD: CVE-2021-45485

CREDITS

Red Hat

Trust: 0.7

sources: PACKETSTORM: 167602 // PACKETSTORM: 169411 // PACKETSTORM: 167622 // PACKETSTORM: 167330 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // PACKETSTORM: 167679

SOURCES

db:VULHUBid:VHN-409116
db:VULMONid:CVE-2021-45485
db:JVNDBid:JVNDB-2021-017434
db:PACKETSTORMid:167602
db:PACKETSTORMid:169411
db:PACKETSTORMid:167622
db:PACKETSTORMid:167330
db:PACKETSTORMid:169941
db:PACKETSTORMid:169997
db:PACKETSTORMid:166101
db:PACKETSTORMid:167679
db:NVDid:CVE-2021-45485

LAST UPDATE DATE

2025-04-28T20:54:05.032000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-409116date:2023-02-24T00:00:00
db:VULMONid:CVE-2021-45485date:2023-02-24T00:00:00
db:JVNDBid:JVNDB-2021-017434date:2023-01-18T05:28:00
db:NVDid:CVE-2021-45485date:2024-11-21T06:32:18.733

SOURCES RELEASE DATE

db:VULHUBid:VHN-409116date:2021-12-25T00:00:00
db:VULMONid:CVE-2021-45485date:2021-12-25T00:00:00
db:JVNDBid:JVNDB-2021-017434date:2023-01-18T00:00:00
db:PACKETSTORMid:167602date:2022-06-28T15:20:26
db:PACKETSTORMid:169411date:2022-10-18T22:30:59
db:PACKETSTORMid:167622date:2022-06-29T20:27:02
db:PACKETSTORMid:167330date:2022-05-31T17:24:53
db:PACKETSTORMid:169941date:2022-11-18T14:28:39
db:PACKETSTORMid:169997date:2022-11-23T15:18:44
db:PACKETSTORMid:166101date:2022-02-22T17:06:12
db:PACKETSTORMid:167679date:2022-07-01T15:04:32
db:NVDid:CVE-2021-45485date:2021-12-25T02:15:06.667