ID

VAR-202102-1092


CVE

CVE-2021-27218


TITLE

GNOME GLib  Vulnerability in conversion between numeric types in

Trust: 0.8

sources: JVNDB: JVNDB-2021-003856

DESCRIPTION

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation. GNOME GLib Is vulnerable to a conversion error between numeric types.Denial of service (DoS) It may be put into a state. Currently there is no information about this vulnerability. Please keep an eye on CNNVD or manufacturer announcements. JIRA issues fixed (https://issues.jboss.org/): TRACING-2083 - Rebuild product images to address CVE-2021-33910 - Jaeger components 1.20 TRACING-2087 - Jaeger agent sidecar injection failed due to missing configmaps in the application namespace 6. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux BaseOS (v. 8): Source: glib2-2.56.4-10.el8_4.1.src.rpm aarch64: glib2-2.56.4-10.el8_4.1.aarch64.rpm glib2-debuginfo-2.56.4-10.el8_4.1.aarch64.rpm glib2-debugsource-2.56.4-10.el8_4.1.aarch64.rpm glib2-devel-2.56.4-10.el8_4.1.aarch64.rpm glib2-devel-debuginfo-2.56.4-10.el8_4.1.aarch64.rpm glib2-fam-2.56.4-10.el8_4.1.aarch64.rpm glib2-fam-debuginfo-2.56.4-10.el8_4.1.aarch64.rpm glib2-tests-2.56.4-10.el8_4.1.aarch64.rpm glib2-tests-debuginfo-2.56.4-10.el8_4.1.aarch64.rpm ppc64le: glib2-2.56.4-10.el8_4.1.ppc64le.rpm glib2-debuginfo-2.56.4-10.el8_4.1.ppc64le.rpm glib2-debugsource-2.56.4-10.el8_4.1.ppc64le.rpm glib2-devel-2.56.4-10.el8_4.1.ppc64le.rpm glib2-devel-debuginfo-2.56.4-10.el8_4.1.ppc64le.rpm glib2-fam-2.56.4-10.el8_4.1.ppc64le.rpm glib2-fam-debuginfo-2.56.4-10.el8_4.1.ppc64le.rpm glib2-tests-2.56.4-10.el8_4.1.ppc64le.rpm glib2-tests-debuginfo-2.56.4-10.el8_4.1.ppc64le.rpm s390x: glib2-2.56.4-10.el8_4.1.s390x.rpm glib2-debuginfo-2.56.4-10.el8_4.1.s390x.rpm glib2-debugsource-2.56.4-10.el8_4.1.s390x.rpm glib2-devel-2.56.4-10.el8_4.1.s390x.rpm glib2-devel-debuginfo-2.56.4-10.el8_4.1.s390x.rpm glib2-fam-2.56.4-10.el8_4.1.s390x.rpm glib2-fam-debuginfo-2.56.4-10.el8_4.1.s390x.rpm glib2-tests-2.56.4-10.el8_4.1.s390x.rpm glib2-tests-debuginfo-2.56.4-10.el8_4.1.s390x.rpm x86_64: glib2-2.56.4-10.el8_4.1.i686.rpm glib2-2.56.4-10.el8_4.1.x86_64.rpm glib2-debuginfo-2.56.4-10.el8_4.1.i686.rpm glib2-debuginfo-2.56.4-10.el8_4.1.x86_64.rpm glib2-debugsource-2.56.4-10.el8_4.1.i686.rpm glib2-debugsource-2.56.4-10.el8_4.1.x86_64.rpm glib2-devel-2.56.4-10.el8_4.1.i686.rpm glib2-devel-2.56.4-10.el8_4.1.x86_64.rpm glib2-devel-debuginfo-2.56.4-10.el8_4.1.i686.rpm glib2-devel-debuginfo-2.56.4-10.el8_4.1.x86_64.rpm glib2-fam-2.56.4-10.el8_4.1.x86_64.rpm glib2-fam-debuginfo-2.56.4-10.el8_4.1.i686.rpm glib2-fam-debuginfo-2.56.4-10.el8_4.1.x86_64.rpm glib2-tests-2.56.4-10.el8_4.1.x86_64.rpm glib2-tests-debuginfo-2.56.4-10.el8_4.1.i686.rpm glib2-tests-debuginfo-2.56.4-10.el8_4.1.x86_64.rpm Red Hat CodeReady Linux Builder (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Software Description: - glib2.0: GLib library of C routines Details: Krzesimir Nowak discovered that GLib incorrectly handled certain large buffers. A remote attacker could use this issue to cause applications linked to GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-27218) Kevin Backhouse discovered that GLib incorrectly handled certain memory allocations. A remote attacker could use this issue to cause applications linked to GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-27219) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: libglib2.0-0 2.66.1-2ubuntu0.1 Ubuntu 20.04 LTS: libglib2.0-0 2.64.6-1~ubuntu20.04.2 Ubuntu 18.04 LTS: libglib2.0-0 2.56.4-0ubuntu0.18.04.7 Ubuntu 16.04 LTS: libglib2.0-0 2.48.2-0ubuntu4.7 After a standard system update you need to restart your session to make all the necessary changes. Clusters and applications are all visible and managed from a single console—with security policy built in. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1959721 - CVE-2019-20149 nodejs-kind-of: ctorName in index.js allows external user input to overwrite certain internal attributes 1991623 - RHACM 2.3.2 images 5. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2021:3263 Space precludes documenting all of the container images in this advisory. Bug Fix(es): * Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3 (BZ#1956462) * OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working (BZ#1971669) * [4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path" (BZ#1973766) * oc logs doesn't work with piepeline builds (BZ#1974264) * "provisioned registration errors" cannot be reported (BZ#1976924) * AWS Elastic IP permissions are incorrectly required (BZ#1981553) * Memory consumption (container_memory_rss) steadily growing for /system.slice/kubelet.service when FIPS enabled [ocp 4.7] (BZ#1981580) * Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit (BZ#1981775) * Size of the hostname was preventing proper DNS resolution of the worker node names (BZ#1983695) * (release-4.7) Insights status card shows nothing when 0 issues found (BZ#1986724) * drop-icmp pod blocks direct SSH access to cluster nodes (BZ#1988426) * Editing a Deployment drops annotations (BZ#1989642) * [Kuryr][4.7] Duplicated egress rule for service network in knp object (BZ#1990175) * Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route (BZ#1991445) * Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build (BZ#1992240) * alerts: SystemMemoryExceedsReservation triggers too quickly (BZ#1992687) * failed to start cri-o service due to /usr/libexec/crio/conmon is missing (BZ#1993386) * Thanos build failure: vendor/ ignored (BZ#1994123) * Ipv6 IP addresses are not accepted for whitelisting (BZ#1994645) * upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop (BZ#1994729) * linuxptp-daemon crash on 4.8 (BZ#1995579) * long living clusters may fail to upgrade because of an invalid conmon path (BZ#1995810) For more details about the security issue(s), refer to the CVE page(s) listed in the References section. You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-x86_64 The image digest is sha256:b3f38d58057a12b0477bf28971390db3e3391ce1af8ac06e35d0aa9e8d8e5966 (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-s390x The image digest is sha256:30c2011f6d84b16960b981a07558f96a55e59a281449d25c5ccc778aaeb2f970 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-ppc64le The image digest is sha256:52ebf0db5a36434357c24a64863025730d2159a94997333f15fbe1444fa88f4f Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor 3. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1863446 - [Assisted-4.5-M2] clean all does not remove ConfigMaps and PVC 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1956462 - Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3 1971669 - OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working 1973766 - [4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path" 1974264 - oc logs doesn't work with piepeline builds 1976924 - "provisioned registration errors" cannot be reported 1981553 - AWS Elastic IP permissions are incorrectly required 1981775 - Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit 1983695 - Size of the hostname was preventing proper DNS resolution of the worker node names 1986724 - (release-4.7) Insights status card shows nothing when 0 issues found 1988426 - drop-icmp pod blocks direct SSH access to cluster nodes 1989642 - Editing a Deployment drops annotations 1990175 - [Kuryr][4.7] Duplicated egress rule for service network in knp object 1991445 - Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route 1992240 - Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build 1992687 - alerts: SystemMemoryExceedsReservation triggers too quickly 1993386 - failed to start cri-o service due to /usr/libexec/crio/conmon is missing 1994123 - Thanos build failure: vendor/ ignored 1994645 - Ipv6 IP addresses are not accepted for whitelisting 1994729 - upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop 1995810 - long living clusters may fail to upgrade because of an invalid conmon path 1998112 - Networking issue with vSphere clusters running HW14 and later 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: ACS 3.64 security and enhancement update Advisory ID: RHSA-2021:3146-01 Product: RHACS Advisory URL: https://access.redhat.com/errata/RHSA-2021:3146 Issue date: 2021-08-11 CVE Names: CVE-2021-27218 CVE-2021-33195 CVE-2021-33197 CVE-2021-33198 CVE-2021-34558 ==================================================================== 1. Summary: Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). * Red Hat Product Security has rated this update as having a "Moderate" security impact. * A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the references section. 2. Description: New Features The release of RHACS 3.64 provides the following new features: 1. You can now use deployment and namespace annotations to define where RHACS sends the violation notifications when configuring your notifiers such as Slack, Microsoft Teams, Email, and others. 2. The Red Hat Advanced Cluster Security Operator now supports the ability to allow users to set the enforcement behavior of the admission controller as part of their custom resource. 3. RHACS now supports kernel modules for Ubuntu 16.04 LTS with extended security maintenance (ESM). Security Fixes The release of RHACS 3.64 provides the following security fixes: * golang: `net` lookup functions may return invalid hostnames (CVE-2021-33195) * golang: `net/http/httputil` ReverseProxy forwards connection headers if the first one is empty (CVE-2021-33197) * golang: `math/big.Rat` may cause panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198) * golang: `crypto/tls` certificate of the wrong type is causing TLS client to panic (CVE-2021-34558) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages in the references section. System changes The release of RHACS 3.64 includes the following system changes: 1. RHACS now pre-fixes the optional security context constraint name with `stackrox` to avoid global naming conflicts. 2. Previously, violations for `port forwards` and `exec` events did not contain information about the user who performed the action that generated the events. The violations now include the user context. 3. The cluster init bundles contain the secrets required for internal RHACS services to communicate with each other. You can delete these to rotate secrets, which have previously sometimes caused outages. This update includes a new deletion workflow that warns about the possible impact of deletion on your environment. 4. The OpenShift compliance operator uses `rpm` only for querying, and it does not install any packages. Therefore, this update includes a policy exception for this pod by default to reduce the violations count. 3. Solution: To take advantage of these new features and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.64 4. Bugs fixed (https://bugzilla.redhat.com/): 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names 1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty 1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents 5. JIRA issues fixed (https://issues.jboss.org/): RHACS-25 - Release RHACS 3.64 6. References: https://access.redhat.com/security/cve/CVE-2021-27218 https://access.redhat.com/security/cve/CVE-2021-33195 https://access.redhat.com/security/cve/CVE-2021-33197 https://access.redhat.com/security/cve/CVE-2021-33198 https://access.redhat.com/security/cve/CVE-2021-34558 https://docs.openshift.com/acs/release_notes/364-release-notes.html https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYRR/dtzjgjWX9erEAQiwMg/8DLRIyhV+QWOxDgfkSsEB7xtCZGtXtaFG xj8HX+yxGvYOCZVLNK+6CR2qhr8MI28QtU4UFhO6WlbyEByVVq6tNJV6Db/ismsX 6+JTK18O+EGEjVK4dhnuvv9+u/155X6UXe60gZxcOmHI/tIiqf7Tz4TmKMsXb02R OPpgOBOEtEEbn9HiJJ9LXiaDyjKB1vSkgLv0RS4M2nvHq9XVUjLPaBq2uroSlCYr Xcne7F2mtEkltGfL3Za4hEaywSZBD0rJe0a5GS/91m3s4SgQvFTs5g4+suBxSjFG AaLpRfMuhWxpgQqYCtTswvUcMi3wsrbNgDtZN3atRruo6RlLCVVpcrDlGRD5/fxn G2YMeSg0WAJhQdU93OYpyGBdhoVdkITjqCV0TsUSDQp77gxfiZ3f+eCybxiCmeil Apb4CypEPucVBzfEi9cCJyNxQLM4p8vzCOF0qS4xiRA9ZDrwvRbdZcjsxKhczLIb gAxLesiu7tfCqLT8Yy4CqCaMlEhSS049jhj6jzlWzRmO0rgpGQfWD1hIlixV+3Xh 4URAmkmE5CRHs6kc6tT4XIS4XcAzn3TvVrMw8yo+bZFGzFMqIvYmhBxaUyYIWdZN /5zbh8OBC2KCqHyQAcL11qnid+o2cnl4mZs+gSwqOGxx8nqKrHPtnTaa2ZMXodJI QjlOAcComy8=OnA7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 1998818 - virt-handler Pod is missing xorrisofs command 1998983 - 4.8.2 containers 2000021 - [VMIO][RHV VM Import] 63 long char VM Name with more than 1 Disk results in DataVolumeCreationFailed 2001038 - Importer attempts to shrink an image in certain situations 2001069 - [4.8.z] Automatic size detection may not request a PVC that is large enough for an import 5. Summary: The Migration Toolkit for Containers (MTC) 1.5.2 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/): 2000734 - CVE-2021-3757 nodejs-immer: prototype pollution may lead to DoS or remote code execution 2005438 - Combining Rsync and Stunnel in a single pod can degrade performance (1.5 backport) 2006842 - MigCluster CR remains in "unready" state and source registry is inaccessible after temporary shutdown of source cluster 2007429 - "oc describe" and "oc log" commands on "Migration resources" tree cannot be copied after failed migration 2022017 - CVE-2021-3948 mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC) 5

Trust: 2.52

sources: NVD: CVE-2021-27218 // JVNDB: JVNDB-2021-003856 // VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // PACKETSTORM: 163927 // PACKETSTORM: 163771 // PACKETSTORM: 161714 // PACKETSTORM: 164076 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164223 // PACKETSTORM: 165099

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.66.7

Trust: 1.0

vendor:broadcommodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.67.4

Trust: 1.0

vendor:gnomemodel:glibscope:gteversion:2.67.0

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:e-series performance analyzerscope:eqversion: -

Trust: 1.0

vendor:gnomemodel:glibscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-003856 // NVD: CVE-2021-27218

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27218
value: HIGH

Trust: 1.0

NVD: CVE-2021-27218
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202102-1182
value: HIGH

Trust: 0.6

VULHUB: VHN-386439
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-27218
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-27218
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-386439
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-27218
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-27218
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // JVNDB: JVNDB-2021-003856 // CNNVD: CNNVD-202102-1182 // NVD: CVE-2021-27218

PROBLEMTYPE DATA

problemtype:CWE-681

Trust: 1.1

problemtype:Incorrect conversion between numeric types (CWE-681) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-386439 // JVNDB: JVNDB-2021-003856 // NVD: CVE-2021-27218

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 161714 // CNNVD: CNNVD-202102-1182

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202102-1182

PATCH

title:gbytearrayurl:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/

Trust: 0.8

title:GNOME Glib Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142632

Trust: 0.6

title:Amazon Linux 2: ALAS2-2021-1711url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1711

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-27218 log

Trust: 0.1

title:Red Hat: Important: Service Telemetry Framework 1.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225924 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.10.3 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220056 - Security Advisory

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-27218

Trust: 0.1

sources: VULMON: CVE-2021-27218 // JVNDB: JVNDB-2021-003856 // CNNVD: CNNVD-202102-1182

EXTERNAL IDS

db:NVDid:CVE-2021-27218

Trust: 3.4

db:PACKETSTORMid:165099

Trust: 0.8

db:PACKETSTORMid:161714

Trust: 0.8

db:JVNDBid:JVNDB-2021-003856

Trust: 0.8

db:PACKETSTORMid:163426

Trust: 0.7

db:PACKETSTORMid:164856

Trust: 0.7

db:PACKETSTORMid:163771

Trust: 0.7

db:PACKETSTORMid:164076

Trust: 0.7

db:PACKETSTORMid:164028

Trust: 0.7

db:PACKETSTORMid:163806

Trust: 0.7

db:PACKETSTORMid:164223

Trust: 0.7

db:AUSCERTid:ESB-2021.0896

Trust: 0.6

db:AUSCERTid:ESB-2021.3168

Trust: 0.6

db:AUSCERTid:ESB-2021.2959

Trust: 0.6

db:AUSCERTid:ESB-2021.0818

Trust: 0.6

db:AUSCERTid:ESB-2021.2736

Trust: 0.6

db:AUSCERTid:ESB-2021.0994

Trust: 0.6

db:AUSCERTid:ESB-2021.3141

Trust: 0.6

db:AUSCERTid:ESB-2022.2809

Trust: 0.6

db:AUSCERTid:ESB-2021.3015

Trust: 0.6

db:AUSCERTid:ESB-2021.3427

Trust: 0.6

db:AUSCERTid:ESB-2022.1025

Trust: 0.6

db:AUSCERTid:ESB-2021.0917

Trust: 0.6

db:AUSCERTid:ESB-2021.2722

Trust: 0.6

db:AUSCERTid:ESB-2022.1837

Trust: 0.6

db:AUSCERTid:ESB-2021.2897

Trust: 0.6

db:AUSCERTid:ESB-2021.3744

Trust: 0.6

db:CS-HELPid:SB2021070711

Trust: 0.6

db:CS-HELPid:SB2021101001

Trust: 0.6

db:CS-HELPid:SB2021111130

Trust: 0.6

db:CS-HELPid:SB2022011038

Trust: 0.6

db:CS-HELPid:SB2021090126

Trust: 0.6

db:CS-HELPid:SB2021122914

Trust: 0.6

db:CS-HELPid:SB2021092209

Trust: 0.6

db:PACKETSTORMid:164192

Trust: 0.6

db:PACKETSTORMid:163957

Trust: 0.6

db:PACKETSTORMid:164511

Trust: 0.6

db:CNNVDid:CNNVD-202102-1182

Trust: 0.6

db:VULHUBid:VHN-386439

Trust: 0.1

db:VULMONid:CVE-2021-27218

Trust: 0.1

db:PACKETSTORMid:163927

Trust: 0.1

sources: VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // JVNDB: JVNDB-2021-003856 // PACKETSTORM: 163927 // PACKETSTORM: 163771 // PACKETSTORM: 161714 // PACKETSTORM: 164076 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164223 // PACKETSTORM: 165099 // CNNVD: CNNVD-202102-1182 // NVD: CVE-2021-27218

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-27218

Trust: 2.2

url:https://security.netapp.com/advisory/ntap-20210319-0004/

Trust: 1.8

url:https://security.gentoo.org/glsa/202107-13

Trust: 1.8

url:https://gitlab.gnome.org/gnome/glib/-/merge_requests/1942

Trust: 1.8

url:https://gitlab.gnome.org/gnome/glib/-/merge_requests/1944

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html

Trust: 1.8

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3cdev.mina.apache.org%3e

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 1.1

url:https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3cissues.bookkeeper.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3cissues.bookkeeper.apache.org%3e

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 0.7

url:https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3cissues.bookkeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3cissues.bookkeeper.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3cdev.mina.apache.org%3e

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2021.0818

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0917

Trust: 0.6

url:https://packetstormsecurity.com/files/164192/red-hat-security-advisory-2021-3556-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021111130

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3427

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0994

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2809

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0896

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2897

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3744

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2959

Trust: 0.6

url:https://packetstormsecurity.com/files/164028/red-hat-security-advisory-2021-3262-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163806/red-hat-security-advisory-2021-3146-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2736

Trust: 0.6

url:https://vigilance.fr/vulnerability/gnome-glib-integer-overflow-via-g-byte-array-new-take-34775

Trust: 0.6

url:https://packetstormsecurity.com/files/163426/gentoo-linux-security-advisory-202107-13.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090126

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3015

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092209

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070711

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122914

Trust: 0.6

url:https://packetstormsecurity.com/files/164223/red-hat-security-advisory-2021-3598-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1025

Trust: 0.6

url:https://packetstormsecurity.com/files/164511/red-hat-security-advisory-2021-3851-01.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6526532

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2722

Trust: 0.6

url:https://packetstormsecurity.com/files/164076/red-hat-security-advisory-2021-3454-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161714/ubuntu-security-notice-usn-4759-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163771/red-hat-security-advisory-2021-3058-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/165099/red-hat-security-advisory-2021-4848-07.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011038

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3168

Trust: 0.6

url:https://packetstormsecurity.com/files/164856/red-hat-security-advisory-2021-4526-03.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6518308

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1837

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021101001

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3141

Trust: 0.6

url:https://packetstormsecurity.com/files/163957/red-hat-security-advisory-2021-3361-01.html

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-34558

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-33195

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-34558

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-33197

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-33198

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-33198

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-33197

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-33195

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-22543

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-22543

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3609

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3609

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-22555

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-22555

Trust: 0.3

url:https://issues.jboss.org/):

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/681.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2021-27218

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://alas.aws.amazon.com/al2/alas-2021-1711.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3517

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3516

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20271

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3541

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3229

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3520

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3520

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33196

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33196

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3517

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3058

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27219

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/glib2.0/2.48.2-0ubuntu4.7

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/glib2.0/2.64.6-1~ubuntu20.04.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/glib2.0/2.56.4-0ubuntu0.18.04.7

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/glib2.0/2.66.1-2ubuntu0.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4759-1

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20149

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27777

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31535

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-32399

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29650

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27777

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-32399

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20149

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29650

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3121

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3262

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2021:3263

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3146

Trust: 0.1

url:https://docs.openshift.com/acs/release_notes/364-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37576

Trust: 0.1

url:https://www.redhat.com/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38201

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3598

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38575

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/virt/upgrading-virt.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38575

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38201

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37576

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3757

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23841

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33574

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22925

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23841

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22947

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23840

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20673

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20266

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3948

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20673

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3733

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20266

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27645

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3778

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35942

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22947

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33929

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36222

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3620

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3796

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.1

sources: VULHUB: VHN-386439 // VULMON: CVE-2021-27218 // JVNDB: JVNDB-2021-003856 // PACKETSTORM: 163927 // PACKETSTORM: 163771 // PACKETSTORM: 161714 // PACKETSTORM: 164076 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164223 // PACKETSTORM: 165099 // CNNVD: CNNVD-202102-1182 // NVD: CVE-2021-27218

CREDITS

Red Hat

Trust: 0.7

sources: PACKETSTORM: 163927 // PACKETSTORM: 163771 // PACKETSTORM: 164076 // PACKETSTORM: 164028 // PACKETSTORM: 163806 // PACKETSTORM: 164223 // PACKETSTORM: 165099

SOURCES

db:VULHUBid:VHN-386439
db:VULMONid:CVE-2021-27218
db:JVNDBid:JVNDB-2021-003856
db:PACKETSTORMid:163927
db:PACKETSTORMid:163771
db:PACKETSTORMid:161714
db:PACKETSTORMid:164076
db:PACKETSTORMid:164028
db:PACKETSTORMid:163806
db:PACKETSTORMid:164223
db:PACKETSTORMid:165099
db:CNNVDid:CNNVD-202102-1182
db:NVDid:CVE-2021-27218

LAST UPDATE DATE

2024-12-21T22:30:42.644000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-386439date:2022-12-07T00:00:00
db:VULMONid:CVE-2021-27218date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2021-003856date:2021-11-08T08:36:00
db:CNNVDid:CNNVD-202102-1182date:2022-06-08T00:00:00
db:NVDid:CVE-2021-27218date:2024-11-21T05:57:37.240

SOURCES RELEASE DATE

db:VULHUBid:VHN-386439date:2021-02-15T00:00:00
db:VULMONid:CVE-2021-27218date:2021-02-15T00:00:00
db:JVNDBid:JVNDB-2021-003856date:2021-11-08T00:00:00
db:PACKETSTORMid:163927date:2021-08-29T11:01:11
db:PACKETSTORMid:163771date:2021-08-10T14:49:40
db:PACKETSTORMid:161714date:2021-03-09T16:02:39
db:PACKETSTORMid:164076date:2021-09-08T14:26:43
db:PACKETSTORMid:164028date:2021-09-02T15:23:31
db:PACKETSTORMid:163806date:2021-08-12T15:48:34
db:PACKETSTORMid:164223date:2021-09-21T15:42:50
db:PACKETSTORMid:165099date:2021-11-30T14:44:48
db:CNNVDid:CNNVD-202102-1182date:2021-02-15T00:00:00
db:NVDid:CVE-2021-27218date:2021-02-15T17:15:13.073