ID

VAR-202102-1093


CVE

CVE-2021-27219


TITLE

GNOME GLib  Vulnerability in conversion between numeric types in

Trust: 0.8

sources: JVNDB: JVNDB-2021-003857

DESCRIPTION

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption. GNOME GLib Is vulnerable to a conversion error between numeric types.Denial of service (DoS) It may be put into a state. Currently there is no information about this vulnerability. Please keep an eye on CNNVD or manufacturer announcements. 8) - noarch 3. The following packages have been upgraded to a later upstream version: mingw-glib2 (2.66.7). Description: Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project, tailored for installation into an on-premise OpenShift Container Platform installation. Bugs fixed (https://bugzilla.redhat.com/): 1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions 5. These packages include redhat-release-virtualization-host. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. 7.3) - noarch, x86_64 3. 8.2) - aarch64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: glib2 security update Advisory ID: RHSA-2021:2174-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2174 Issue date: 2021-06-01 CVE Names: CVE-2021-27219 ==================================================================== 1. Summary: An update for glib2 is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64 3. Description: GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: glib2-2.50.3-4.el7_4.src.rpm x86_64: glib2-2.50.3-4.el7_4.i686.rpm glib2-2.50.3-4.el7_4.x86_64.rpm glib2-debuginfo-2.50.3-4.el7_4.i686.rpm glib2-debuginfo-2.50.3-4.el7_4.x86_64.rpm glib2-devel-2.50.3-4.el7_4.i686.rpm glib2-devel-2.50.3-4.el7_4.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: glib2-2.50.3-4.el7_4.src.rpm ppc64le: glib2-2.50.3-4.el7_4.ppc64le.rpm glib2-debuginfo-2.50.3-4.el7_4.ppc64le.rpm glib2-devel-2.50.3-4.el7_4.ppc64le.rpm x86_64: glib2-2.50.3-4.el7_4.i686.rpm glib2-2.50.3-4.el7_4.x86_64.rpm glib2-debuginfo-2.50.3-4.el7_4.i686.rpm glib2-debuginfo-2.50.3-4.el7_4.x86_64.rpm glib2-devel-2.50.3-4.el7_4.i686.rpm glib2-devel-2.50.3-4.el7_4.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: glib2-2.50.3-4.el7_4.src.rpm x86_64: glib2-2.50.3-4.el7_4.i686.rpm glib2-2.50.3-4.el7_4.x86_64.rpm glib2-debuginfo-2.50.3-4.el7_4.i686.rpm glib2-debuginfo-2.50.3-4.el7_4.x86_64.rpm glib2-devel-2.50.3-4.el7_4.i686.rpm glib2-devel-2.50.3-4.el7_4.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.4): noarch: glib2-doc-2.50.3-4.el7_4.noarch.rpm x86_64: glib2-debuginfo-2.50.3-4.el7_4.i686.rpm glib2-debuginfo-2.50.3-4.el7_4.x86_64.rpm glib2-fam-2.50.3-4.el7_4.x86_64.rpm glib2-static-2.50.3-4.el7_4.i686.rpm glib2-static-2.50.3-4.el7_4.x86_64.rpm glib2-tests-2.50.3-4.el7_4.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.4): noarch: glib2-doc-2.50.3-4.el7_4.noarch.rpm ppc64le: glib2-debuginfo-2.50.3-4.el7_4.ppc64le.rpm glib2-fam-2.50.3-4.el7_4.ppc64le.rpm glib2-static-2.50.3-4.el7_4.ppc64le.rpm glib2-tests-2.50.3-4.el7_4.ppc64le.rpm x86_64: glib2-debuginfo-2.50.3-4.el7_4.i686.rpm glib2-debuginfo-2.50.3-4.el7_4.x86_64.rpm glib2-fam-2.50.3-4.el7_4.x86_64.rpm glib2-static-2.50.3-4.el7_4.i686.rpm glib2-static-2.50.3-4.el7_4.x86_64.rpm glib2-tests-2.50.3-4.el7_4.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.4): noarch: glib2-doc-2.50.3-4.el7_4.noarch.rpm x86_64: glib2-debuginfo-2.50.3-4.el7_4.i686.rpm glib2-debuginfo-2.50.3-4.el7_4.x86_64.rpm glib2-fam-2.50.3-4.el7_4.x86_64.rpm glib2-static-2.50.3-4.el7_4.i686.rpm glib2-static-2.50.3-4.el7_4.x86_64.rpm glib2-tests-2.50.3-4.el7_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-27219 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYLYYptzjgjWX9erEAQhH2w/7BmVMxX9Bxpe0XfXUK/utQK42LFQmy8fV B/7MC9Mvi+kF2kKStjPo+YSJR4O1Om7kuK/sv6UJPtc+bjgw5aLqFcxqapGylAU9 /xTO5RkiR14TxXIQMFXcKkISsesCwRCuDL0Vyr9KXxdiv1IghfjkWWLv3qqPIbL/ jm1IBbcIDvRiABzASCbhuntgeF1nUFZ7Fn4IkzNUVKSqWX5SsQcDrLVHdVQDbpe4 bK714tbGkQ5sMR9M/YUcNitovaRLBlhNtT3dtY6QoNLxwXPc+b9fhKyVSI4CJT7k wdXOPc0brSg7K+et6aDNU6l8oUfSvJpb8489shxQfEsK+oDZXUDMiJPLfi5HNEhE I+/1E3blaDNaAlsybf/R/db2LxGON8W6rzHBcbCMIPqg6e2ZtTBATJjYgw6liykr jZuxPtmiMc662TCBtStxqKdBKpFNgKKQh1fmhO6vfj0G9ro4Col19DYcWmqFH8np 0H4igXwJvNXg5rP6V6FCP/JVVi2oAzIiSARXBVbMGcPhAtvt6FN0+L247s7BGuQP O//llRcUr6ifUDtgJdcpN5jyonjnj8sVnAmPPeGECy1TGMArDybp5P7qEQwubrC0 eN5M6RaBAk9XVhMLxyRPCsnY/+uoIISaRK5Qjtvc0r3gOWhf2OlMO2BLcLkEvlsH FH8Eepv6YZo=9n3l -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bug Fix(es): * Refcounting issue causes crashes and slow workarounds (BZ#1953553) 4. 7.7) - noarch, ppc64, ppc64le, s390x, x86_64 3. 7) - aarch64, noarch, ppc64le, s390x 3. Description: The OpenShift Container Storage solution provides persistent storage service for OpenShift Containers and OpenShift Infrastructure services. All users of OpenShift Container Storage 3.11 container images are advised to pull these updated images from the Red Hat Container Registry. Bugs fixed (https://bugzilla.redhat.com/): 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1957321 - Respin the rhgs-server-container container to include latest glusterfs rpm for RHGS 3.5.5 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1987163 - respin volmanager to include latest heketi rpm 5

Trust: 2.61

sources: NVD: CVE-2021-27219 // JVNDB: JVNDB-2021-003857 // VULHUB: VHN-386440 // PACKETSTORM: 164856 // PACKETSTORM: 163276 // PACKETSTORM: 163240 // PACKETSTORM: 162888 // PACKETSTORM: 162889 // PACKETSTORM: 162892 // PACKETSTORM: 162893 // PACKETSTORM: 162895 // PACKETSTORM: 162932 // PACKETSTORM: 164452

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:broadcommodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.67.3

Trust: 1.0

vendor:gnomemodel:glibscope:ltversion:2.66.6

Trust: 1.0

vendor:gnomemodel:glibscope:gteversion:2.67.0

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:e-series performance analyzerscope:eqversion: -

Trust: 1.0

vendor:gnomemodel:glibscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-003857 // NVD: CVE-2021-27219

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27219
value: HIGH

Trust: 1.0

NVD: CVE-2021-27219
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202102-1181
value: HIGH

Trust: 0.6

VULHUB: VHN-386440
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-27219
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-386440
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-27219
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-27219
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-386440 // JVNDB: JVNDB-2021-003857 // CNNVD: CNNVD-202102-1181 // NVD: CVE-2021-27219

PROBLEMTYPE DATA

problemtype:CWE-681

Trust: 1.1

problemtype:Incorrect conversion between numeric types (CWE-681) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-386440 // JVNDB: JVNDB-2021-003857 // NVD: CVE-2021-27219

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202102-1181

TYPE

overflow

Trust: 0.8

sources: PACKETSTORM: 164856 // PACKETSTORM: 163240 // PACKETSTORM: 162888 // PACKETSTORM: 162889 // PACKETSTORM: 162892 // PACKETSTORM: 162893 // PACKETSTORM: 162895 // PACKETSTORM: 162932

PATCH

title:CVE-2021-27219 (GHSL-2021-045)url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/

Trust: 0.8

title:GNOME Glib Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142631

Trust: 0.6

sources: JVNDB: JVNDB-2021-003857 // CNNVD: CNNVD-202102-1181

EXTERNAL IDS

db:NVDid:CVE-2021-27219

Trust: 3.5

db:PACKETSTORMid:164856

Trust: 0.8

db:JVNDBid:JVNDB-2021-003857

Trust: 0.8

db:PACKETSTORMid:161714

Trust: 0.7

db:PACKETSTORMid:162884

Trust: 0.7

db:PACKETSTORMid:163496

Trust: 0.7

db:PACKETSTORMid:163133

Trust: 0.7

db:PACKETSTORMid:163426

Trust: 0.7

db:PACKETSTORMid:162869

Trust: 0.7

db:PACKETSTORMid:163149

Trust: 0.7

db:PACKETSTORMid:163267

Trust: 0.7

db:PACKETSTORMid:162929

Trust: 0.7

db:PACKETSTORMid:164452

Trust: 0.7

db:AUSCERTid:ESB-2021.0896

Trust: 0.6

db:AUSCERTid:ESB-2021.3340

Trust: 0.6

db:AUSCERTid:ESB-2021.4083

Trust: 0.6

db:AUSCERTid:ESB-2021.0818

Trust: 0.6

db:AUSCERTid:ESB-2021.3019

Trust: 0.6

db:AUSCERTid:ESB-2021.2180

Trust: 0.6

db:AUSCERTid:ESB-2021.2711

Trust: 0.6

db:AUSCERTid:ESB-2022.2809

Trust: 0.6

db:AUSCERTid:ESB-2021.1922

Trust: 0.6

db:AUSCERTid:ESB-2021.2131

Trust: 0.6

db:AUSCERTid:ESB-2021.2365

Trust: 0.6

db:AUSCERTid:ESB-2021.3744

Trust: 0.6

db:AUSCERTid:ESB-2021.1856

Trust: 0.6

db:AUSCERTid:ESB-2021.2657

Trust: 0.6

db:AUSCERTid:ESB-2021.0994

Trust: 0.6

db:AUSCERTid:ESB-2021.0917

Trust: 0.6

db:AUSCERTid:ESB-2021.2228

Trust: 0.6

db:AUSCERTid:ESB-2021.2123

Trust: 0.6

db:CS-HELPid:SB2021070711

Trust: 0.6

db:CS-HELPid:SB2021060225

Trust: 0.6

db:CS-HELPid:SB2021062703

Trust: 0.6

db:CS-HELPid:SB2021053117

Trust: 0.6

db:CS-HELPid:SB2021090833

Trust: 0.6

db:CS-HELPid:SB2022011038

Trust: 0.6

db:CS-HELPid:SB2021111130

Trust: 0.6

db:CS-HELPid:SB2021071516

Trust: 0.6

db:CS-HELPid:SB2021061422

Trust: 0.6

db:CS-HELPid:SB2021122914

Trust: 0.6

db:CS-HELPid:SB2021092220

Trust: 0.6

db:CS-HELPid:SB2021062315

Trust: 0.6

db:CNNVDid:CNNVD-202102-1181

Trust: 0.6

db:PACKETSTORMid:162892

Trust: 0.2

db:PACKETSTORMid:162895

Trust: 0.2

db:PACKETSTORMid:162932

Trust: 0.2

db:PACKETSTORMid:162893

Trust: 0.2

db:PACKETSTORMid:162889

Trust: 0.2

db:PACKETSTORMid:163240

Trust: 0.2

db:PACKETSTORMid:162888

Trust: 0.2

db:PACKETSTORMid:163191

Trust: 0.1

db:PACKETSTORMid:163257

Trust: 0.1

db:PACKETSTORMid:163242

Trust: 0.1

db:VULHUBid:VHN-386440

Trust: 0.1

db:PACKETSTORMid:163276

Trust: 0.1

sources: VULHUB: VHN-386440 // JVNDB: JVNDB-2021-003857 // PACKETSTORM: 164856 // PACKETSTORM: 163276 // PACKETSTORM: 163240 // PACKETSTORM: 162888 // PACKETSTORM: 162889 // PACKETSTORM: 162892 // PACKETSTORM: 162893 // PACKETSTORM: 162895 // PACKETSTORM: 162932 // PACKETSTORM: 164452 // CNNVD: CNNVD-202102-1181 // NVD: CVE-2021-27219

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-27219

Trust: 2.3

url:https://security.netapp.com/advisory/ntap-20210319-0004/

Trust: 1.7

url:https://security.gentoo.org/glsa/202107-13

Trust: 1.7

url:https://gitlab.gnome.org/gnome/glib/-/issues/2319

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html

Trust: 1.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.0

url:https://access.redhat.com/security/cve/cve-2021-27219

Trust: 1.0

url:https://bugzilla.redhat.com/):

Trust: 1.0

url:https://access.redhat.com/security/team/contact/

Trust: 1.0

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3cdev.mina.apache.org%3e

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 1.0

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.8

url:https://access.redhat.com/articles/11258

Trust: 0.8

url:https://access.redhat.com/security/team/key/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jjmpndo4gdvuryqfykfowy5haf4ftepn/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2rea7rvkn7zhrljoegbrqkjipzqpaelz/

Trust: 0.7

url:https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3cdev.mina.apache.org%3e

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2021.0818

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0917

Trust: 0.6

url:https://packetstormsecurity.com/files/162869/red-hat-security-advisory-2021-2147-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021111130

Trust: 0.6

url:https://packetstormsecurity.com/files/163149/red-hat-security-advisory-2021-2286-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162884/red-hat-security-advisory-2021-2172-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2657

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0994

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2711

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2809

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0896

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3744

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1922

Trust: 0.6

url:https://packetstormsecurity.com/files/163426/gentoo-linux-security-advisory-202107-13.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163133/red-hat-security-advisory-2021-2374-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2123

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070711

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2365

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2180

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060225

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122914

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4083

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6520674

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021053117

Trust: 0.6

url:https://packetstormsecurity.com/files/163496/red-hat-security-advisory-2021-2705-01.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6526532

Trust: 0.6

url:https://vigilance.fr/vulnerability/gnome-glib-integer-overflow-via-g-bytes-new-34776

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2228

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062703

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092220

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3019

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-glibc-vulnerability-affects-ibm-elastic-storage-system-cve-2021-27219/

Trust: 0.6

url:https://packetstormsecurity.com/files/161714/ubuntu-security-notice-usn-4759-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1856

Trust: 0.6

url:https://packetstormsecurity.com/files/163267/red-hat-security-advisory-2021-2532-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011038

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2131

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3340

Trust: 0.6

url:https://packetstormsecurity.com/files/164452/red-hat-security-advisory-2021-3748-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021061422

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021071516

Trust: 0.6

url:https://packetstormsecurity.com/files/162929/red-hat-security-advisory-2021-2203-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062315

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090833

Trust: 0.6

url:https://packetstormsecurity.com/files/164856/red-hat-security-advisory-2021-4526-03.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6518308

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2021-3114

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2021:4526

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-25013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28500

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28500

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-2708

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8286

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26116

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8284

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28196

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23336

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8927

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13434

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-14502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13949

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8285

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8285

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8286

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/jaeger/jaeger_install/rhb

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27618

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26116

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3842

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8927

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2708

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13776

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-10228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29363

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27619

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2543

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24977

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3842

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13776

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23336

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3326

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3449

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23337

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24977

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24489

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25217

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-25217

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24489

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2519

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2173

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2171

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2174

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2170

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2175

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2204

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25692

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25692

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31525

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25648

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31525

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25648

Trust: 0.1

sources: VULHUB: VHN-386440 // JVNDB: JVNDB-2021-003857 // PACKETSTORM: 164856 // PACKETSTORM: 163276 // PACKETSTORM: 163240 // PACKETSTORM: 162888 // PACKETSTORM: 162889 // PACKETSTORM: 162892 // PACKETSTORM: 162893 // PACKETSTORM: 162895 // PACKETSTORM: 162932 // PACKETSTORM: 164452 // CNNVD: CNNVD-202102-1181 // NVD: CVE-2021-27219

CREDITS

Red Hat

Trust: 1.0

sources: PACKETSTORM: 164856 // PACKETSTORM: 163276 // PACKETSTORM: 163240 // PACKETSTORM: 162888 // PACKETSTORM: 162889 // PACKETSTORM: 162892 // PACKETSTORM: 162893 // PACKETSTORM: 162895 // PACKETSTORM: 162932 // PACKETSTORM: 164452

SOURCES

db:VULHUBid:VHN-386440
db:JVNDBid:JVNDB-2021-003857
db:PACKETSTORMid:164856
db:PACKETSTORMid:163276
db:PACKETSTORMid:163240
db:PACKETSTORMid:162888
db:PACKETSTORMid:162889
db:PACKETSTORMid:162892
db:PACKETSTORMid:162893
db:PACKETSTORMid:162895
db:PACKETSTORMid:162932
db:PACKETSTORMid:164452
db:CNNVDid:CNNVD-202102-1181
db:NVDid:CVE-2021-27219

LAST UPDATE DATE

2025-02-20T19:59:41.021000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-386440date:2022-12-07T00:00:00
db:JVNDBid:JVNDB-2021-003857date:2021-11-08T08:36:00
db:CNNVDid:CNNVD-202102-1181date:2022-06-08T00:00:00
db:NVDid:CVE-2021-27219date:2024-11-21T05:57:37.410

SOURCES RELEASE DATE

db:VULHUBid:VHN-386440date:2021-02-15T00:00:00
db:JVNDBid:JVNDB-2021-003857date:2021-11-08T00:00:00
db:PACKETSTORMid:164856date:2021-11-10T17:07:39
db:PACKETSTORMid:163276date:2021-06-24T17:54:53
db:PACKETSTORMid:163240date:2021-06-22T19:32:24
db:PACKETSTORMid:162888date:2021-06-01T15:11:42
db:PACKETSTORMid:162889date:2021-06-01T15:11:50
db:PACKETSTORMid:162892date:2021-06-01T15:13:12
db:PACKETSTORMid:162893date:2021-06-01T15:13:19
db:PACKETSTORMid:162895date:2021-06-01T15:14:05
db:PACKETSTORMid:162932date:2021-06-03T14:50:29
db:PACKETSTORMid:164452date:2021-10-08T15:35:28
db:CNNVDid:CNNVD-202102-1181date:2021-02-15T00:00:00
db:NVDid:CVE-2021-27219date:2021-02-15T17:15:13.137