ID

VAR-202105-1306


CVE

CVE-2021-33574


TITLE

GNU C Library Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202105-1666

DESCRIPTION

The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. The vulnerability stems from the library's mq_notify function having a use-after-free feature. Bugs fixed (https://bugzilla.redhat.com/): 1944888 - CVE-2021-21409 netty: Request smuggling via content-length header 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value 5. JIRA issues fixed (https://issues.jboss.org/): LOG-1971 - Applying cluster state is causing elasticsearch to hit an issue and become unusable 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: glibc security, bug fix, and enhancement update Advisory ID: RHSA-2021:4358-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4358 Issue date: 2021-11-09 CVE Names: CVE-2021-27645 CVE-2021-33574 CVE-2021-35942 ==================================================================== 1. Summary: An update for glibc is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Arbitrary read in wordexp() (CVE-2021-35942) * glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c (CVE-2021-27645) * glibc: mq_notify does not handle separately allocated thread attributes (CVE-2021-33574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1871386 - glibc: Update syscall names for Linux 5.6, 5.7, and 5.8. 1912670 - semctl SEM_STAT_ANY fails to pass the buffer specified by the caller to the kernel 1927877 - CVE-2021-27645 glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c [rhel-8] 1930302 - glibc: provide IPPROTO_MPTCP definition 1932589 - CVE-2021-27645 glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c 1935128 - glibc: Rebuild glibc after objcopy fix for bug 1928936 [rhel-8.5.0] 1965408 - CVE-2021-33574 glibc: mq_notify does not handle separately allocated thread attributes 1977975 - CVE-2021-35942 glibc: Arbitrary read in wordexp() 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): aarch64: compat-libpthread-nonshared-2.28-164.el8.aarch64.rpm glibc-debuginfo-2.28-164.el8.aarch64.rpm glibc-utils-2.28-164.el8.aarch64.rpm ppc64le: compat-libpthread-nonshared-2.28-164.el8.ppc64le.rpm glibc-debuginfo-2.28-164.el8.ppc64le.rpm glibc-debuginfo-common-2.28-164.el8.ppc64le.rpm glibc-utils-2.28-164.el8.ppc64le.rpm s390x: compat-libpthread-nonshared-2.28-164.el8.s390x.rpm glibc-debuginfo-2.28-164.el8.s390x.rpm glibc-debuginfo-common-2.28-164.el8.s390x.rpm glibc-utils-2.28-164.el8.s390x.rpm x86_64: compat-libpthread-nonshared-2.28-164.el8.x86_64.rpm glibc-debuginfo-2.28-164.el8.x86_64.rpm glibc-debuginfo-common-2.28-164.el8.x86_64.rpm glibc-utils-2.28-164.el8.x86_64.rpm Red Hat Enterprise Linux BaseOS (v. 8): Source: glibc-2.28-164.el8.src.rpm aarch64: glibc-2.28-164.el8.aarch64.rpm glibc-all-langpacks-2.28-164.el8.aarch64.rpm glibc-common-2.28-164.el8.aarch64.rpm glibc-debuginfo-2.28-164.el8.aarch64.rpm glibc-devel-2.28-164.el8.aarch64.rpm glibc-headers-2.28-164.el8.aarch64.rpm glibc-langpack-aa-2.28-164.el8.aarch64.rpm glibc-langpack-af-2.28-164.el8.aarch64.rpm glibc-langpack-agr-2.28-164.el8.aarch64.rpm glibc-langpack-ak-2.28-164.el8.aarch64.rpm glibc-langpack-am-2.28-164.el8.aarch64.rpm glibc-langpack-an-2.28-164.el8.aarch64.rpm glibc-langpack-anp-2.28-164.el8.aarch64.rpm glibc-langpack-ar-2.28-164.el8.aarch64.rpm glibc-langpack-as-2.28-164.el8.aarch64.rpm glibc-langpack-ast-2.28-164.el8.aarch64.rpm glibc-langpack-ayc-2.28-164.el8.aarch64.rpm glibc-langpack-az-2.28-164.el8.aarch64.rpm glibc-langpack-be-2.28-164.el8.aarch64.rpm glibc-langpack-bem-2.28-164.el8.aarch64.rpm glibc-langpack-ber-2.28-164.el8.aarch64.rpm glibc-langpack-bg-2.28-164.el8.aarch64.rpm glibc-langpack-bhb-2.28-164.el8.aarch64.rpm glibc-langpack-bho-2.28-164.el8.aarch64.rpm glibc-langpack-bi-2.28-164.el8.aarch64.rpm glibc-langpack-bn-2.28-164.el8.aarch64.rpm glibc-langpack-bo-2.28-164.el8.aarch64.rpm glibc-langpack-br-2.28-164.el8.aarch64.rpm glibc-langpack-brx-2.28-164.el8.aarch64.rpm glibc-langpack-bs-2.28-164.el8.aarch64.rpm glibc-langpack-byn-2.28-164.el8.aarch64.rpm glibc-langpack-ca-2.28-164.el8.aarch64.rpm glibc-langpack-ce-2.28-164.el8.aarch64.rpm glibc-langpack-chr-2.28-164.el8.aarch64.rpm glibc-langpack-cmn-2.28-164.el8.aarch64.rpm glibc-langpack-crh-2.28-164.el8.aarch64.rpm glibc-langpack-cs-2.28-164.el8.aarch64.rpm glibc-langpack-csb-2.28-164.el8.aarch64.rpm glibc-langpack-cv-2.28-164.el8.aarch64.rpm glibc-langpack-cy-2.28-164.el8.aarch64.rpm glibc-langpack-da-2.28-164.el8.aarch64.rpm glibc-langpack-de-2.28-164.el8.aarch64.rpm glibc-langpack-doi-2.28-164.el8.aarch64.rpm glibc-langpack-dsb-2.28-164.el8.aarch64.rpm glibc-langpack-dv-2.28-164.el8.aarch64.rpm glibc-langpack-dz-2.28-164.el8.aarch64.rpm glibc-langpack-el-2.28-164.el8.aarch64.rpm glibc-langpack-en-2.28-164.el8.aarch64.rpm glibc-langpack-eo-2.28-164.el8.aarch64.rpm glibc-langpack-es-2.28-164.el8.aarch64.rpm glibc-langpack-et-2.28-164.el8.aarch64.rpm glibc-langpack-eu-2.28-164.el8.aarch64.rpm glibc-langpack-fa-2.28-164.el8.aarch64.rpm glibc-langpack-ff-2.28-164.el8.aarch64.rpm glibc-langpack-fi-2.28-164.el8.aarch64.rpm glibc-langpack-fil-2.28-164.el8.aarch64.rpm glibc-langpack-fo-2.28-164.el8.aarch64.rpm glibc-langpack-fr-2.28-164.el8.aarch64.rpm glibc-langpack-fur-2.28-164.el8.aarch64.rpm glibc-langpack-fy-2.28-164.el8.aarch64.rpm glibc-langpack-ga-2.28-164.el8.aarch64.rpm glibc-langpack-gd-2.28-164.el8.aarch64.rpm glibc-langpack-gez-2.28-164.el8.aarch64.rpm glibc-langpack-gl-2.28-164.el8.aarch64.rpm glibc-langpack-gu-2.28-164.el8.aarch64.rpm glibc-langpack-gv-2.28-164.el8.aarch64.rpm glibc-langpack-ha-2.28-164.el8.aarch64.rpm glibc-langpack-hak-2.28-164.el8.aarch64.rpm glibc-langpack-he-2.28-164.el8.aarch64.rpm glibc-langpack-hi-2.28-164.el8.aarch64.rpm glibc-langpack-hif-2.28-164.el8.aarch64.rpm glibc-langpack-hne-2.28-164.el8.aarch64.rpm glibc-langpack-hr-2.28-164.el8.aarch64.rpm glibc-langpack-hsb-2.28-164.el8.aarch64.rpm glibc-langpack-ht-2.28-164.el8.aarch64.rpm glibc-langpack-hu-2.28-164.el8.aarch64.rpm glibc-langpack-hy-2.28-164.el8.aarch64.rpm glibc-langpack-ia-2.28-164.el8.aarch64.rpm glibc-langpack-id-2.28-164.el8.aarch64.rpm glibc-langpack-ig-2.28-164.el8.aarch64.rpm glibc-langpack-ik-2.28-164.el8.aarch64.rpm glibc-langpack-is-2.28-164.el8.aarch64.rpm glibc-langpack-it-2.28-164.el8.aarch64.rpm glibc-langpack-iu-2.28-164.el8.aarch64.rpm glibc-langpack-ja-2.28-164.el8.aarch64.rpm glibc-langpack-ka-2.28-164.el8.aarch64.rpm glibc-langpack-kab-2.28-164.el8.aarch64.rpm glibc-langpack-kk-2.28-164.el8.aarch64.rpm glibc-langpack-kl-2.28-164.el8.aarch64.rpm glibc-langpack-km-2.28-164.el8.aarch64.rpm glibc-langpack-kn-2.28-164.el8.aarch64.rpm glibc-langpack-ko-2.28-164.el8.aarch64.rpm glibc-langpack-kok-2.28-164.el8.aarch64.rpm glibc-langpack-ks-2.28-164.el8.aarch64.rpm glibc-langpack-ku-2.28-164.el8.aarch64.rpm glibc-langpack-kw-2.28-164.el8.aarch64.rpm glibc-langpack-ky-2.28-164.el8.aarch64.rpm glibc-langpack-lb-2.28-164.el8.aarch64.rpm glibc-langpack-lg-2.28-164.el8.aarch64.rpm glibc-langpack-li-2.28-164.el8.aarch64.rpm glibc-langpack-lij-2.28-164.el8.aarch64.rpm glibc-langpack-ln-2.28-164.el8.aarch64.rpm glibc-langpack-lo-2.28-164.el8.aarch64.rpm glibc-langpack-lt-2.28-164.el8.aarch64.rpm glibc-langpack-lv-2.28-164.el8.aarch64.rpm glibc-langpack-lzh-2.28-164.el8.aarch64.rpm glibc-langpack-mag-2.28-164.el8.aarch64.rpm glibc-langpack-mai-2.28-164.el8.aarch64.rpm glibc-langpack-mfe-2.28-164.el8.aarch64.rpm glibc-langpack-mg-2.28-164.el8.aarch64.rpm glibc-langpack-mhr-2.28-164.el8.aarch64.rpm glibc-langpack-mi-2.28-164.el8.aarch64.rpm glibc-langpack-miq-2.28-164.el8.aarch64.rpm glibc-langpack-mjw-2.28-164.el8.aarch64.rpm glibc-langpack-mk-2.28-164.el8.aarch64.rpm glibc-langpack-ml-2.28-164.el8.aarch64.rpm glibc-langpack-mn-2.28-164.el8.aarch64.rpm glibc-langpack-mni-2.28-164.el8.aarch64.rpm glibc-langpack-mr-2.28-164.el8.aarch64.rpm glibc-langpack-ms-2.28-164.el8.aarch64.rpm glibc-langpack-mt-2.28-164.el8.aarch64.rpm glibc-langpack-my-2.28-164.el8.aarch64.rpm glibc-langpack-nan-2.28-164.el8.aarch64.rpm glibc-langpack-nb-2.28-164.el8.aarch64.rpm glibc-langpack-nds-2.28-164.el8.aarch64.rpm glibc-langpack-ne-2.28-164.el8.aarch64.rpm glibc-langpack-nhn-2.28-164.el8.aarch64.rpm glibc-langpack-niu-2.28-164.el8.aarch64.rpm glibc-langpack-nl-2.28-164.el8.aarch64.rpm glibc-langpack-nn-2.28-164.el8.aarch64.rpm glibc-langpack-nr-2.28-164.el8.aarch64.rpm glibc-langpack-nso-2.28-164.el8.aarch64.rpm glibc-langpack-oc-2.28-164.el8.aarch64.rpm glibc-langpack-om-2.28-164.el8.aarch64.rpm glibc-langpack-or-2.28-164.el8.aarch64.rpm glibc-langpack-os-2.28-164.el8.aarch64.rpm glibc-langpack-pa-2.28-164.el8.aarch64.rpm glibc-langpack-pap-2.28-164.el8.aarch64.rpm glibc-langpack-pl-2.28-164.el8.aarch64.rpm glibc-langpack-ps-2.28-164.el8.aarch64.rpm glibc-langpack-pt-2.28-164.el8.aarch64.rpm glibc-langpack-quz-2.28-164.el8.aarch64.rpm glibc-langpack-raj-2.28-164.el8.aarch64.rpm glibc-langpack-ro-2.28-164.el8.aarch64.rpm glibc-langpack-ru-2.28-164.el8.aarch64.rpm glibc-langpack-rw-2.28-164.el8.aarch64.rpm glibc-langpack-sa-2.28-164.el8.aarch64.rpm glibc-langpack-sah-2.28-164.el8.aarch64.rpm glibc-langpack-sat-2.28-164.el8.aarch64.rpm glibc-langpack-sc-2.28-164.el8.aarch64.rpm glibc-langpack-sd-2.28-164.el8.aarch64.rpm glibc-langpack-se-2.28-164.el8.aarch64.rpm glibc-langpack-sgs-2.28-164.el8.aarch64.rpm glibc-langpack-shn-2.28-164.el8.aarch64.rpm glibc-langpack-shs-2.28-164.el8.aarch64.rpm glibc-langpack-si-2.28-164.el8.aarch64.rpm glibc-langpack-sid-2.28-164.el8.aarch64.rpm glibc-langpack-sk-2.28-164.el8.aarch64.rpm glibc-langpack-sl-2.28-164.el8.aarch64.rpm glibc-langpack-sm-2.28-164.el8.aarch64.rpm glibc-langpack-so-2.28-164.el8.aarch64.rpm glibc-langpack-sq-2.28-164.el8.aarch64.rpm glibc-langpack-sr-2.28-164.el8.aarch64.rpm glibc-langpack-ss-2.28-164.el8.aarch64.rpm glibc-langpack-st-2.28-164.el8.aarch64.rpm glibc-langpack-sv-2.28-164.el8.aarch64.rpm glibc-langpack-sw-2.28-164.el8.aarch64.rpm glibc-langpack-szl-2.28-164.el8.aarch64.rpm glibc-langpack-ta-2.28-164.el8.aarch64.rpm glibc-langpack-tcy-2.28-164.el8.aarch64.rpm glibc-langpack-te-2.28-164.el8.aarch64.rpm glibc-langpack-tg-2.28-164.el8.aarch64.rpm glibc-langpack-th-2.28-164.el8.aarch64.rpm glibc-langpack-the-2.28-164.el8.aarch64.rpm glibc-langpack-ti-2.28-164.el8.aarch64.rpm glibc-langpack-tig-2.28-164.el8.aarch64.rpm glibc-langpack-tk-2.28-164.el8.aarch64.rpm glibc-langpack-tl-2.28-164.el8.aarch64.rpm glibc-langpack-tn-2.28-164.el8.aarch64.rpm glibc-langpack-to-2.28-164.el8.aarch64.rpm glibc-langpack-tpi-2.28-164.el8.aarch64.rpm glibc-langpack-tr-2.28-164.el8.aarch64.rpm glibc-langpack-ts-2.28-164.el8.aarch64.rpm glibc-langpack-tt-2.28-164.el8.aarch64.rpm glibc-langpack-ug-2.28-164.el8.aarch64.rpm glibc-langpack-uk-2.28-164.el8.aarch64.rpm glibc-langpack-unm-2.28-164.el8.aarch64.rpm glibc-langpack-ur-2.28-164.el8.aarch64.rpm glibc-langpack-uz-2.28-164.el8.aarch64.rpm glibc-langpack-ve-2.28-164.el8.aarch64.rpm glibc-langpack-vi-2.28-164.el8.aarch64.rpm glibc-langpack-wa-2.28-164.el8.aarch64.rpm glibc-langpack-wae-2.28-164.el8.aarch64.rpm glibc-langpack-wal-2.28-164.el8.aarch64.rpm glibc-langpack-wo-2.28-164.el8.aarch64.rpm glibc-langpack-xh-2.28-164.el8.aarch64.rpm glibc-langpack-yi-2.28-164.el8.aarch64.rpm glibc-langpack-yo-2.28-164.el8.aarch64.rpm glibc-langpack-yue-2.28-164.el8.aarch64.rpm glibc-langpack-yuw-2.28-164.el8.aarch64.rpm glibc-langpack-zh-2.28-164.el8.aarch64.rpm glibc-langpack-zu-2.28-164.el8.aarch64.rpm glibc-locale-source-2.28-164.el8.aarch64.rpm glibc-minimal-langpack-2.28-164.el8.aarch64.rpm libnsl-2.28-164.el8.aarch64.rpm nscd-2.28-164.el8.aarch64.rpm nss_db-2.28-164.el8.aarch64.rpm ppc64le: glibc-2.28-164.el8.ppc64le.rpm glibc-all-langpacks-2.28-164.el8.ppc64le.rpm glibc-common-2.28-164.el8.ppc64le.rpm glibc-debuginfo-2.28-164.el8.ppc64le.rpm glibc-debuginfo-common-2.28-164.el8.ppc64le.rpm glibc-devel-2.28-164.el8.ppc64le.rpm glibc-headers-2.28-164.el8.ppc64le.rpm glibc-langpack-aa-2.28-164.el8.ppc64le.rpm glibc-langpack-af-2.28-164.el8.ppc64le.rpm glibc-langpack-agr-2.28-164.el8.ppc64le.rpm glibc-langpack-ak-2.28-164.el8.ppc64le.rpm glibc-langpack-am-2.28-164.el8.ppc64le.rpm glibc-langpack-an-2.28-164.el8.ppc64le.rpm glibc-langpack-anp-2.28-164.el8.ppc64le.rpm glibc-langpack-ar-2.28-164.el8.ppc64le.rpm glibc-langpack-as-2.28-164.el8.ppc64le.rpm glibc-langpack-ast-2.28-164.el8.ppc64le.rpm glibc-langpack-ayc-2.28-164.el8.ppc64le.rpm glibc-langpack-az-2.28-164.el8.ppc64le.rpm glibc-langpack-be-2.28-164.el8.ppc64le.rpm glibc-langpack-bem-2.28-164.el8.ppc64le.rpm glibc-langpack-ber-2.28-164.el8.ppc64le.rpm glibc-langpack-bg-2.28-164.el8.ppc64le.rpm glibc-langpack-bhb-2.28-164.el8.ppc64le.rpm glibc-langpack-bho-2.28-164.el8.ppc64le.rpm glibc-langpack-bi-2.28-164.el8.ppc64le.rpm glibc-langpack-bn-2.28-164.el8.ppc64le.rpm glibc-langpack-bo-2.28-164.el8.ppc64le.rpm glibc-langpack-br-2.28-164.el8.ppc64le.rpm glibc-langpack-brx-2.28-164.el8.ppc64le.rpm glibc-langpack-bs-2.28-164.el8.ppc64le.rpm glibc-langpack-byn-2.28-164.el8.ppc64le.rpm glibc-langpack-ca-2.28-164.el8.ppc64le.rpm glibc-langpack-ce-2.28-164.el8.ppc64le.rpm glibc-langpack-chr-2.28-164.el8.ppc64le.rpm glibc-langpack-cmn-2.28-164.el8.ppc64le.rpm glibc-langpack-crh-2.28-164.el8.ppc64le.rpm glibc-langpack-cs-2.28-164.el8.ppc64le.rpm glibc-langpack-csb-2.28-164.el8.ppc64le.rpm glibc-langpack-cv-2.28-164.el8.ppc64le.rpm glibc-langpack-cy-2.28-164.el8.ppc64le.rpm glibc-langpack-da-2.28-164.el8.ppc64le.rpm glibc-langpack-de-2.28-164.el8.ppc64le.rpm glibc-langpack-doi-2.28-164.el8.ppc64le.rpm glibc-langpack-dsb-2.28-164.el8.ppc64le.rpm glibc-langpack-dv-2.28-164.el8.ppc64le.rpm glibc-langpack-dz-2.28-164.el8.ppc64le.rpm glibc-langpack-el-2.28-164.el8.ppc64le.rpm glibc-langpack-en-2.28-164.el8.ppc64le.rpm glibc-langpack-eo-2.28-164.el8.ppc64le.rpm glibc-langpack-es-2.28-164.el8.ppc64le.rpm glibc-langpack-et-2.28-164.el8.ppc64le.rpm glibc-langpack-eu-2.28-164.el8.ppc64le.rpm glibc-langpack-fa-2.28-164.el8.ppc64le.rpm glibc-langpack-ff-2.28-164.el8.ppc64le.rpm glibc-langpack-fi-2.28-164.el8.ppc64le.rpm glibc-langpack-fil-2.28-164.el8.ppc64le.rpm glibc-langpack-fo-2.28-164.el8.ppc64le.rpm glibc-langpack-fr-2.28-164.el8.ppc64le.rpm glibc-langpack-fur-2.28-164.el8.ppc64le.rpm glibc-langpack-fy-2.28-164.el8.ppc64le.rpm glibc-langpack-ga-2.28-164.el8.ppc64le.rpm glibc-langpack-gd-2.28-164.el8.ppc64le.rpm glibc-langpack-gez-2.28-164.el8.ppc64le.rpm glibc-langpack-gl-2.28-164.el8.ppc64le.rpm glibc-langpack-gu-2.28-164.el8.ppc64le.rpm glibc-langpack-gv-2.28-164.el8.ppc64le.rpm glibc-langpack-ha-2.28-164.el8.ppc64le.rpm glibc-langpack-hak-2.28-164.el8.ppc64le.rpm glibc-langpack-he-2.28-164.el8.ppc64le.rpm glibc-langpack-hi-2.28-164.el8.ppc64le.rpm glibc-langpack-hif-2.28-164.el8.ppc64le.rpm glibc-langpack-hne-2.28-164.el8.ppc64le.rpm glibc-langpack-hr-2.28-164.el8.ppc64le.rpm glibc-langpack-hsb-2.28-164.el8.ppc64le.rpm glibc-langpack-ht-2.28-164.el8.ppc64le.rpm glibc-langpack-hu-2.28-164.el8.ppc64le.rpm glibc-langpack-hy-2.28-164.el8.ppc64le.rpm glibc-langpack-ia-2.28-164.el8.ppc64le.rpm glibc-langpack-id-2.28-164.el8.ppc64le.rpm glibc-langpack-ig-2.28-164.el8.ppc64le.rpm glibc-langpack-ik-2.28-164.el8.ppc64le.rpm glibc-langpack-is-2.28-164.el8.ppc64le.rpm glibc-langpack-it-2.28-164.el8.ppc64le.rpm glibc-langpack-iu-2.28-164.el8.ppc64le.rpm glibc-langpack-ja-2.28-164.el8.ppc64le.rpm glibc-langpack-ka-2.28-164.el8.ppc64le.rpm glibc-langpack-kab-2.28-164.el8.ppc64le.rpm glibc-langpack-kk-2.28-164.el8.ppc64le.rpm glibc-langpack-kl-2.28-164.el8.ppc64le.rpm glibc-langpack-km-2.28-164.el8.ppc64le.rpm glibc-langpack-kn-2.28-164.el8.ppc64le.rpm glibc-langpack-ko-2.28-164.el8.ppc64le.rpm glibc-langpack-kok-2.28-164.el8.ppc64le.rpm glibc-langpack-ks-2.28-164.el8.ppc64le.rpm glibc-langpack-ku-2.28-164.el8.ppc64le.rpm glibc-langpack-kw-2.28-164.el8.ppc64le.rpm glibc-langpack-ky-2.28-164.el8.ppc64le.rpm glibc-langpack-lb-2.28-164.el8.ppc64le.rpm glibc-langpack-lg-2.28-164.el8.ppc64le.rpm glibc-langpack-li-2.28-164.el8.ppc64le.rpm glibc-langpack-lij-2.28-164.el8.ppc64le.rpm glibc-langpack-ln-2.28-164.el8.ppc64le.rpm glibc-langpack-lo-2.28-164.el8.ppc64le.rpm glibc-langpack-lt-2.28-164.el8.ppc64le.rpm glibc-langpack-lv-2.28-164.el8.ppc64le.rpm glibc-langpack-lzh-2.28-164.el8.ppc64le.rpm glibc-langpack-mag-2.28-164.el8.ppc64le.rpm glibc-langpack-mai-2.28-164.el8.ppc64le.rpm glibc-langpack-mfe-2.28-164.el8.ppc64le.rpm glibc-langpack-mg-2.28-164.el8.ppc64le.rpm glibc-langpack-mhr-2.28-164.el8.ppc64le.rpm glibc-langpack-mi-2.28-164.el8.ppc64le.rpm glibc-langpack-miq-2.28-164.el8.ppc64le.rpm glibc-langpack-mjw-2.28-164.el8.ppc64le.rpm glibc-langpack-mk-2.28-164.el8.ppc64le.rpm glibc-langpack-ml-2.28-164.el8.ppc64le.rpm glibc-langpack-mn-2.28-164.el8.ppc64le.rpm glibc-langpack-mni-2.28-164.el8.ppc64le.rpm glibc-langpack-mr-2.28-164.el8.ppc64le.rpm glibc-langpack-ms-2.28-164.el8.ppc64le.rpm glibc-langpack-mt-2.28-164.el8.ppc64le.rpm glibc-langpack-my-2.28-164.el8.ppc64le.rpm glibc-langpack-nan-2.28-164.el8.ppc64le.rpm glibc-langpack-nb-2.28-164.el8.ppc64le.rpm glibc-langpack-nds-2.28-164.el8.ppc64le.rpm glibc-langpack-ne-2.28-164.el8.ppc64le.rpm glibc-langpack-nhn-2.28-164.el8.ppc64le.rpm glibc-langpack-niu-2.28-164.el8.ppc64le.rpm glibc-langpack-nl-2.28-164.el8.ppc64le.rpm glibc-langpack-nn-2.28-164.el8.ppc64le.rpm glibc-langpack-nr-2.28-164.el8.ppc64le.rpm glibc-langpack-nso-2.28-164.el8.ppc64le.rpm glibc-langpack-oc-2.28-164.el8.ppc64le.rpm glibc-langpack-om-2.28-164.el8.ppc64le.rpm glibc-langpack-or-2.28-164.el8.ppc64le.rpm glibc-langpack-os-2.28-164.el8.ppc64le.rpm glibc-langpack-pa-2.28-164.el8.ppc64le.rpm glibc-langpack-pap-2.28-164.el8.ppc64le.rpm glibc-langpack-pl-2.28-164.el8.ppc64le.rpm glibc-langpack-ps-2.28-164.el8.ppc64le.rpm glibc-langpack-pt-2.28-164.el8.ppc64le.rpm glibc-langpack-quz-2.28-164.el8.ppc64le.rpm glibc-langpack-raj-2.28-164.el8.ppc64le.rpm glibc-langpack-ro-2.28-164.el8.ppc64le.rpm glibc-langpack-ru-2.28-164.el8.ppc64le.rpm glibc-langpack-rw-2.28-164.el8.ppc64le.rpm glibc-langpack-sa-2.28-164.el8.ppc64le.rpm glibc-langpack-sah-2.28-164.el8.ppc64le.rpm glibc-langpack-sat-2.28-164.el8.ppc64le.rpm glibc-langpack-sc-2.28-164.el8.ppc64le.rpm glibc-langpack-sd-2.28-164.el8.ppc64le.rpm glibc-langpack-se-2.28-164.el8.ppc64le.rpm glibc-langpack-sgs-2.28-164.el8.ppc64le.rpm glibc-langpack-shn-2.28-164.el8.ppc64le.rpm glibc-langpack-shs-2.28-164.el8.ppc64le.rpm glibc-langpack-si-2.28-164.el8.ppc64le.rpm glibc-langpack-sid-2.28-164.el8.ppc64le.rpm glibc-langpack-sk-2.28-164.el8.ppc64le.rpm glibc-langpack-sl-2.28-164.el8.ppc64le.rpm glibc-langpack-sm-2.28-164.el8.ppc64le.rpm glibc-langpack-so-2.28-164.el8.ppc64le.rpm glibc-langpack-sq-2.28-164.el8.ppc64le.rpm glibc-langpack-sr-2.28-164.el8.ppc64le.rpm glibc-langpack-ss-2.28-164.el8.ppc64le.rpm glibc-langpack-st-2.28-164.el8.ppc64le.rpm glibc-langpack-sv-2.28-164.el8.ppc64le.rpm glibc-langpack-sw-2.28-164.el8.ppc64le.rpm glibc-langpack-szl-2.28-164.el8.ppc64le.rpm glibc-langpack-ta-2.28-164.el8.ppc64le.rpm glibc-langpack-tcy-2.28-164.el8.ppc64le.rpm glibc-langpack-te-2.28-164.el8.ppc64le.rpm glibc-langpack-tg-2.28-164.el8.ppc64le.rpm glibc-langpack-th-2.28-164.el8.ppc64le.rpm glibc-langpack-the-2.28-164.el8.ppc64le.rpm glibc-langpack-ti-2.28-164.el8.ppc64le.rpm glibc-langpack-tig-2.28-164.el8.ppc64le.rpm glibc-langpack-tk-2.28-164.el8.ppc64le.rpm glibc-langpack-tl-2.28-164.el8.ppc64le.rpm glibc-langpack-tn-2.28-164.el8.ppc64le.rpm glibc-langpack-to-2.28-164.el8.ppc64le.rpm glibc-langpack-tpi-2.28-164.el8.ppc64le.rpm glibc-langpack-tr-2.28-164.el8.ppc64le.rpm glibc-langpack-ts-2.28-164.el8.ppc64le.rpm glibc-langpack-tt-2.28-164.el8.ppc64le.rpm glibc-langpack-ug-2.28-164.el8.ppc64le.rpm glibc-langpack-uk-2.28-164.el8.ppc64le.rpm glibc-langpack-unm-2.28-164.el8.ppc64le.rpm glibc-langpack-ur-2.28-164.el8.ppc64le.rpm glibc-langpack-uz-2.28-164.el8.ppc64le.rpm glibc-langpack-ve-2.28-164.el8.ppc64le.rpm glibc-langpack-vi-2.28-164.el8.ppc64le.rpm glibc-langpack-wa-2.28-164.el8.ppc64le.rpm glibc-langpack-wae-2.28-164.el8.ppc64le.rpm glibc-langpack-wal-2.28-164.el8.ppc64le.rpm glibc-langpack-wo-2.28-164.el8.ppc64le.rpm glibc-langpack-xh-2.28-164.el8.ppc64le.rpm glibc-langpack-yi-2.28-164.el8.ppc64le.rpm glibc-langpack-yo-2.28-164.el8.ppc64le.rpm glibc-langpack-yue-2.28-164.el8.ppc64le.rpm glibc-langpack-yuw-2.28-164.el8.ppc64le.rpm glibc-langpack-zh-2.28-164.el8.ppc64le.rpm glibc-langpack-zu-2.28-164.el8.ppc64le.rpm glibc-locale-source-2.28-164.el8.ppc64le.rpm glibc-minimal-langpack-2.28-164.el8.ppc64le.rpm libnsl-2.28-164.el8.ppc64le.rpm nscd-2.28-164.el8.ppc64le.rpm nss_db-2.28-164.el8.ppc64le.rpm s390x: glibc-2.28-164.el8.s390x.rpm glibc-all-langpacks-2.28-164.el8.s390x.rpm glibc-common-2.28-164.el8.s390x.rpm glibc-debuginfo-2.28-164.el8.s390x.rpm glibc-debuginfo-common-2.28-164.el8.s390x.rpm glibc-devel-2.28-164.el8.s390x.rpm glibc-headers-2.28-164.el8.s390x.rpm glibc-langpack-aa-2.28-164.el8.s390x.rpm glibc-langpack-af-2.28-164.el8.s390x.rpm glibc-langpack-agr-2.28-164.el8.s390x.rpm glibc-langpack-ak-2.28-164.el8.s390x.rpm glibc-langpack-am-2.28-164.el8.s390x.rpm glibc-langpack-an-2.28-164.el8.s390x.rpm glibc-langpack-anp-2.28-164.el8.s390x.rpm glibc-langpack-ar-2.28-164.el8.s390x.rpm glibc-langpack-as-2.28-164.el8.s390x.rpm glibc-langpack-ast-2.28-164.el8.s390x.rpm glibc-langpack-ayc-2.28-164.el8.s390x.rpm glibc-langpack-az-2.28-164.el8.s390x.rpm glibc-langpack-be-2.28-164.el8.s390x.rpm glibc-langpack-bem-2.28-164.el8.s390x.rpm glibc-langpack-ber-2.28-164.el8.s390x.rpm glibc-langpack-bg-2.28-164.el8.s390x.rpm glibc-langpack-bhb-2.28-164.el8.s390x.rpm glibc-langpack-bho-2.28-164.el8.s390x.rpm glibc-langpack-bi-2.28-164.el8.s390x.rpm glibc-langpack-bn-2.28-164.el8.s390x.rpm glibc-langpack-bo-2.28-164.el8.s390x.rpm glibc-langpack-br-2.28-164.el8.s390x.rpm glibc-langpack-brx-2.28-164.el8.s390x.rpm glibc-langpack-bs-2.28-164.el8.s390x.rpm glibc-langpack-byn-2.28-164.el8.s390x.rpm glibc-langpack-ca-2.28-164.el8.s390x.rpm glibc-langpack-ce-2.28-164.el8.s390x.rpm glibc-langpack-chr-2.28-164.el8.s390x.rpm glibc-langpack-cmn-2.28-164.el8.s390x.rpm glibc-langpack-crh-2.28-164.el8.s390x.rpm glibc-langpack-cs-2.28-164.el8.s390x.rpm glibc-langpack-csb-2.28-164.el8.s390x.rpm glibc-langpack-cv-2.28-164.el8.s390x.rpm glibc-langpack-cy-2.28-164.el8.s390x.rpm glibc-langpack-da-2.28-164.el8.s390x.rpm glibc-langpack-de-2.28-164.el8.s390x.rpm glibc-langpack-doi-2.28-164.el8.s390x.rpm glibc-langpack-dsb-2.28-164.el8.s390x.rpm glibc-langpack-dv-2.28-164.el8.s390x.rpm glibc-langpack-dz-2.28-164.el8.s390x.rpm glibc-langpack-el-2.28-164.el8.s390x.rpm glibc-langpack-en-2.28-164.el8.s390x.rpm glibc-langpack-eo-2.28-164.el8.s390x.rpm glibc-langpack-es-2.28-164.el8.s390x.rpm glibc-langpack-et-2.28-164.el8.s390x.rpm glibc-langpack-eu-2.28-164.el8.s390x.rpm glibc-langpack-fa-2.28-164.el8.s390x.rpm glibc-langpack-ff-2.28-164.el8.s390x.rpm glibc-langpack-fi-2.28-164.el8.s390x.rpm glibc-langpack-fil-2.28-164.el8.s390x.rpm glibc-langpack-fo-2.28-164.el8.s390x.rpm glibc-langpack-fr-2.28-164.el8.s390x.rpm glibc-langpack-fur-2.28-164.el8.s390x.rpm glibc-langpack-fy-2.28-164.el8.s390x.rpm glibc-langpack-ga-2.28-164.el8.s390x.rpm glibc-langpack-gd-2.28-164.el8.s390x.rpm glibc-langpack-gez-2.28-164.el8.s390x.rpm glibc-langpack-gl-2.28-164.el8.s390x.rpm glibc-langpack-gu-2.28-164.el8.s390x.rpm glibc-langpack-gv-2.28-164.el8.s390x.rpm glibc-langpack-ha-2.28-164.el8.s390x.rpm glibc-langpack-hak-2.28-164.el8.s390x.rpm glibc-langpack-he-2.28-164.el8.s390x.rpm glibc-langpack-hi-2.28-164.el8.s390x.rpm glibc-langpack-hif-2.28-164.el8.s390x.rpm glibc-langpack-hne-2.28-164.el8.s390x.rpm glibc-langpack-hr-2.28-164.el8.s390x.rpm glibc-langpack-hsb-2.28-164.el8.s390x.rpm glibc-langpack-ht-2.28-164.el8.s390x.rpm glibc-langpack-hu-2.28-164.el8.s390x.rpm glibc-langpack-hy-2.28-164.el8.s390x.rpm glibc-langpack-ia-2.28-164.el8.s390x.rpm glibc-langpack-id-2.28-164.el8.s390x.rpm glibc-langpack-ig-2.28-164.el8.s390x.rpm glibc-langpack-ik-2.28-164.el8.s390x.rpm glibc-langpack-is-2.28-164.el8.s390x.rpm glibc-langpack-it-2.28-164.el8.s390x.rpm glibc-langpack-iu-2.28-164.el8.s390x.rpm glibc-langpack-ja-2.28-164.el8.s390x.rpm glibc-langpack-ka-2.28-164.el8.s390x.rpm glibc-langpack-kab-2.28-164.el8.s390x.rpm glibc-langpack-kk-2.28-164.el8.s390x.rpm glibc-langpack-kl-2.28-164.el8.s390x.rpm glibc-langpack-km-2.28-164.el8.s390x.rpm glibc-langpack-kn-2.28-164.el8.s390x.rpm glibc-langpack-ko-2.28-164.el8.s390x.rpm glibc-langpack-kok-2.28-164.el8.s390x.rpm glibc-langpack-ks-2.28-164.el8.s390x.rpm glibc-langpack-ku-2.28-164.el8.s390x.rpm glibc-langpack-kw-2.28-164.el8.s390x.rpm glibc-langpack-ky-2.28-164.el8.s390x.rpm glibc-langpack-lb-2.28-164.el8.s390x.rpm glibc-langpack-lg-2.28-164.el8.s390x.rpm glibc-langpack-li-2.28-164.el8.s390x.rpm glibc-langpack-lij-2.28-164.el8.s390x.rpm glibc-langpack-ln-2.28-164.el8.s390x.rpm glibc-langpack-lo-2.28-164.el8.s390x.rpm glibc-langpack-lt-2.28-164.el8.s390x.rpm glibc-langpack-lv-2.28-164.el8.s390x.rpm glibc-langpack-lzh-2.28-164.el8.s390x.rpm glibc-langpack-mag-2.28-164.el8.s390x.rpm glibc-langpack-mai-2.28-164.el8.s390x.rpm glibc-langpack-mfe-2.28-164.el8.s390x.rpm glibc-langpack-mg-2.28-164.el8.s390x.rpm glibc-langpack-mhr-2.28-164.el8.s390x.rpm glibc-langpack-mi-2.28-164.el8.s390x.rpm glibc-langpack-miq-2.28-164.el8.s390x.rpm glibc-langpack-mjw-2.28-164.el8.s390x.rpm glibc-langpack-mk-2.28-164.el8.s390x.rpm glibc-langpack-ml-2.28-164.el8.s390x.rpm glibc-langpack-mn-2.28-164.el8.s390x.rpm glibc-langpack-mni-2.28-164.el8.s390x.rpm glibc-langpack-mr-2.28-164.el8.s390x.rpm glibc-langpack-ms-2.28-164.el8.s390x.rpm glibc-langpack-mt-2.28-164.el8.s390x.rpm glibc-langpack-my-2.28-164.el8.s390x.rpm glibc-langpack-nan-2.28-164.el8.s390x.rpm glibc-langpack-nb-2.28-164.el8.s390x.rpm glibc-langpack-nds-2.28-164.el8.s390x.rpm glibc-langpack-ne-2.28-164.el8.s390x.rpm glibc-langpack-nhn-2.28-164.el8.s390x.rpm glibc-langpack-niu-2.28-164.el8.s390x.rpm glibc-langpack-nl-2.28-164.el8.s390x.rpm glibc-langpack-nn-2.28-164.el8.s390x.rpm glibc-langpack-nr-2.28-164.el8.s390x.rpm glibc-langpack-nso-2.28-164.el8.s390x.rpm glibc-langpack-oc-2.28-164.el8.s390x.rpm glibc-langpack-om-2.28-164.el8.s390x.rpm glibc-langpack-or-2.28-164.el8.s390x.rpm glibc-langpack-os-2.28-164.el8.s390x.rpm glibc-langpack-pa-2.28-164.el8.s390x.rpm glibc-langpack-pap-2.28-164.el8.s390x.rpm glibc-langpack-pl-2.28-164.el8.s390x.rpm glibc-langpack-ps-2.28-164.el8.s390x.rpm glibc-langpack-pt-2.28-164.el8.s390x.rpm glibc-langpack-quz-2.28-164.el8.s390x.rpm glibc-langpack-raj-2.28-164.el8.s390x.rpm glibc-langpack-ro-2.28-164.el8.s390x.rpm glibc-langpack-ru-2.28-164.el8.s390x.rpm glibc-langpack-rw-2.28-164.el8.s390x.rpm glibc-langpack-sa-2.28-164.el8.s390x.rpm glibc-langpack-sah-2.28-164.el8.s390x.rpm glibc-langpack-sat-2.28-164.el8.s390x.rpm glibc-langpack-sc-2.28-164.el8.s390x.rpm glibc-langpack-sd-2.28-164.el8.s390x.rpm glibc-langpack-se-2.28-164.el8.s390x.rpm glibc-langpack-sgs-2.28-164.el8.s390x.rpm glibc-langpack-shn-2.28-164.el8.s390x.rpm glibc-langpack-shs-2.28-164.el8.s390x.rpm glibc-langpack-si-2.28-164.el8.s390x.rpm glibc-langpack-sid-2.28-164.el8.s390x.rpm glibc-langpack-sk-2.28-164.el8.s390x.rpm glibc-langpack-sl-2.28-164.el8.s390x.rpm glibc-langpack-sm-2.28-164.el8.s390x.rpm glibc-langpack-so-2.28-164.el8.s390x.rpm glibc-langpack-sq-2.28-164.el8.s390x.rpm glibc-langpack-sr-2.28-164.el8.s390x.rpm glibc-langpack-ss-2.28-164.el8.s390x.rpm glibc-langpack-st-2.28-164.el8.s390x.rpm glibc-langpack-sv-2.28-164.el8.s390x.rpm glibc-langpack-sw-2.28-164.el8.s390x.rpm glibc-langpack-szl-2.28-164.el8.s390x.rpm glibc-langpack-ta-2.28-164.el8.s390x.rpm glibc-langpack-tcy-2.28-164.el8.s390x.rpm glibc-langpack-te-2.28-164.el8.s390x.rpm glibc-langpack-tg-2.28-164.el8.s390x.rpm glibc-langpack-th-2.28-164.el8.s390x.rpm glibc-langpack-the-2.28-164.el8.s390x.rpm glibc-langpack-ti-2.28-164.el8.s390x.rpm glibc-langpack-tig-2.28-164.el8.s390x.rpm glibc-langpack-tk-2.28-164.el8.s390x.rpm glibc-langpack-tl-2.28-164.el8.s390x.rpm glibc-langpack-tn-2.28-164.el8.s390x.rpm glibc-langpack-to-2.28-164.el8.s390x.rpm glibc-langpack-tpi-2.28-164.el8.s390x.rpm glibc-langpack-tr-2.28-164.el8.s390x.rpm glibc-langpack-ts-2.28-164.el8.s390x.rpm glibc-langpack-tt-2.28-164.el8.s390x.rpm glibc-langpack-ug-2.28-164.el8.s390x.rpm glibc-langpack-uk-2.28-164.el8.s390x.rpm glibc-langpack-unm-2.28-164.el8.s390x.rpm glibc-langpack-ur-2.28-164.el8.s390x.rpm glibc-langpack-uz-2.28-164.el8.s390x.rpm glibc-langpack-ve-2.28-164.el8.s390x.rpm glibc-langpack-vi-2.28-164.el8.s390x.rpm glibc-langpack-wa-2.28-164.el8.s390x.rpm glibc-langpack-wae-2.28-164.el8.s390x.rpm glibc-langpack-wal-2.28-164.el8.s390x.rpm glibc-langpack-wo-2.28-164.el8.s390x.rpm glibc-langpack-xh-2.28-164.el8.s390x.rpm glibc-langpack-yi-2.28-164.el8.s390x.rpm glibc-langpack-yo-2.28-164.el8.s390x.rpm glibc-langpack-yue-2.28-164.el8.s390x.rpm glibc-langpack-yuw-2.28-164.el8.s390x.rpm glibc-langpack-zh-2.28-164.el8.s390x.rpm glibc-langpack-zu-2.28-164.el8.s390x.rpm glibc-locale-source-2.28-164.el8.s390x.rpm glibc-minimal-langpack-2.28-164.el8.s390x.rpm libnsl-2.28-164.el8.s390x.rpm nscd-2.28-164.el8.s390x.rpm nss_db-2.28-164.el8.s390x.rpm x86_64: glibc-2.28-164.el8.i686.rpm glibc-2.28-164.el8.x86_64.rpm glibc-all-langpacks-2.28-164.el8.x86_64.rpm glibc-common-2.28-164.el8.x86_64.rpm glibc-debuginfo-2.28-164.el8.i686.rpm glibc-debuginfo-2.28-164.el8.x86_64.rpm glibc-debuginfo-common-2.28-164.el8.i686.rpm glibc-debuginfo-common-2.28-164.el8.x86_64.rpm glibc-devel-2.28-164.el8.i686.rpm glibc-devel-2.28-164.el8.x86_64.rpm glibc-headers-2.28-164.el8.i686.rpm glibc-headers-2.28-164.el8.x86_64.rpm glibc-langpack-aa-2.28-164.el8.x86_64.rpm glibc-langpack-af-2.28-164.el8.x86_64.rpm glibc-langpack-agr-2.28-164.el8.x86_64.rpm glibc-langpack-ak-2.28-164.el8.x86_64.rpm glibc-langpack-am-2.28-164.el8.x86_64.rpm glibc-langpack-an-2.28-164.el8.x86_64.rpm glibc-langpack-anp-2.28-164.el8.x86_64.rpm glibc-langpack-ar-2.28-164.el8.x86_64.rpm glibc-langpack-as-2.28-164.el8.x86_64.rpm glibc-langpack-ast-2.28-164.el8.x86_64.rpm glibc-langpack-ayc-2.28-164.el8.x86_64.rpm glibc-langpack-az-2.28-164.el8.x86_64.rpm glibc-langpack-be-2.28-164.el8.x86_64.rpm glibc-langpack-bem-2.28-164.el8.x86_64.rpm glibc-langpack-ber-2.28-164.el8.x86_64.rpm glibc-langpack-bg-2.28-164.el8.x86_64.rpm glibc-langpack-bhb-2.28-164.el8.x86_64.rpm glibc-langpack-bho-2.28-164.el8.x86_64.rpm glibc-langpack-bi-2.28-164.el8.x86_64.rpm glibc-langpack-bn-2.28-164.el8.x86_64.rpm glibc-langpack-bo-2.28-164.el8.x86_64.rpm glibc-langpack-br-2.28-164.el8.x86_64.rpm glibc-langpack-brx-2.28-164.el8.x86_64.rpm glibc-langpack-bs-2.28-164.el8.x86_64.rpm glibc-langpack-byn-2.28-164.el8.x86_64.rpm glibc-langpack-ca-2.28-164.el8.x86_64.rpm glibc-langpack-ce-2.28-164.el8.x86_64.rpm glibc-langpack-chr-2.28-164.el8.x86_64.rpm glibc-langpack-cmn-2.28-164.el8.x86_64.rpm glibc-langpack-crh-2.28-164.el8.x86_64.rpm glibc-langpack-cs-2.28-164.el8.x86_64.rpm glibc-langpack-csb-2.28-164.el8.x86_64.rpm glibc-langpack-cv-2.28-164.el8.x86_64.rpm glibc-langpack-cy-2.28-164.el8.x86_64.rpm glibc-langpack-da-2.28-164.el8.x86_64.rpm glibc-langpack-de-2.28-164.el8.x86_64.rpm glibc-langpack-doi-2.28-164.el8.x86_64.rpm glibc-langpack-dsb-2.28-164.el8.x86_64.rpm glibc-langpack-dv-2.28-164.el8.x86_64.rpm glibc-langpack-dz-2.28-164.el8.x86_64.rpm glibc-langpack-el-2.28-164.el8.x86_64.rpm glibc-langpack-en-2.28-164.el8.x86_64.rpm glibc-langpack-eo-2.28-164.el8.x86_64.rpm glibc-langpack-es-2.28-164.el8.x86_64.rpm glibc-langpack-et-2.28-164.el8.x86_64.rpm glibc-langpack-eu-2.28-164.el8.x86_64.rpm glibc-langpack-fa-2.28-164.el8.x86_64.rpm glibc-langpack-ff-2.28-164.el8.x86_64.rpm glibc-langpack-fi-2.28-164.el8.x86_64.rpm glibc-langpack-fil-2.28-164.el8.x86_64.rpm glibc-langpack-fo-2.28-164.el8.x86_64.rpm glibc-langpack-fr-2.28-164.el8.x86_64.rpm glibc-langpack-fur-2.28-164.el8.x86_64.rpm glibc-langpack-fy-2.28-164.el8.x86_64.rpm glibc-langpack-ga-2.28-164.el8.x86_64.rpm glibc-langpack-gd-2.28-164.el8.x86_64.rpm glibc-langpack-gez-2.28-164.el8.x86_64.rpm glibc-langpack-gl-2.28-164.el8.x86_64.rpm glibc-langpack-gu-2.28-164.el8.x86_64.rpm glibc-langpack-gv-2.28-164.el8.x86_64.rpm glibc-langpack-ha-2.28-164.el8.x86_64.rpm glibc-langpack-hak-2.28-164.el8.x86_64.rpm glibc-langpack-he-2.28-164.el8.x86_64.rpm glibc-langpack-hi-2.28-164.el8.x86_64.rpm glibc-langpack-hif-2.28-164.el8.x86_64.rpm glibc-langpack-hne-2.28-164.el8.x86_64.rpm glibc-langpack-hr-2.28-164.el8.x86_64.rpm glibc-langpack-hsb-2.28-164.el8.x86_64.rpm glibc-langpack-ht-2.28-164.el8.x86_64.rpm glibc-langpack-hu-2.28-164.el8.x86_64.rpm glibc-langpack-hy-2.28-164.el8.x86_64.rpm glibc-langpack-ia-2.28-164.el8.x86_64.rpm glibc-langpack-id-2.28-164.el8.x86_64.rpm glibc-langpack-ig-2.28-164.el8.x86_64.rpm glibc-langpack-ik-2.28-164.el8.x86_64.rpm glibc-langpack-is-2.28-164.el8.x86_64.rpm glibc-langpack-it-2.28-164.el8.x86_64.rpm glibc-langpack-iu-2.28-164.el8.x86_64.rpm glibc-langpack-ja-2.28-164.el8.x86_64.rpm glibc-langpack-ka-2.28-164.el8.x86_64.rpm glibc-langpack-kab-2.28-164.el8.x86_64.rpm glibc-langpack-kk-2.28-164.el8.x86_64.rpm glibc-langpack-kl-2.28-164.el8.x86_64.rpm glibc-langpack-km-2.28-164.el8.x86_64.rpm glibc-langpack-kn-2.28-164.el8.x86_64.rpm glibc-langpack-ko-2.28-164.el8.x86_64.rpm glibc-langpack-kok-2.28-164.el8.x86_64.rpm glibc-langpack-ks-2.28-164.el8.x86_64.rpm glibc-langpack-ku-2.28-164.el8.x86_64.rpm glibc-langpack-kw-2.28-164.el8.x86_64.rpm glibc-langpack-ky-2.28-164.el8.x86_64.rpm glibc-langpack-lb-2.28-164.el8.x86_64.rpm glibc-langpack-lg-2.28-164.el8.x86_64.rpm glibc-langpack-li-2.28-164.el8.x86_64.rpm glibc-langpack-lij-2.28-164.el8.x86_64.rpm glibc-langpack-ln-2.28-164.el8.x86_64.rpm glibc-langpack-lo-2.28-164.el8.x86_64.rpm glibc-langpack-lt-2.28-164.el8.x86_64.rpm glibc-langpack-lv-2.28-164.el8.x86_64.rpm glibc-langpack-lzh-2.28-164.el8.x86_64.rpm glibc-langpack-mag-2.28-164.el8.x86_64.rpm glibc-langpack-mai-2.28-164.el8.x86_64.rpm glibc-langpack-mfe-2.28-164.el8.x86_64.rpm glibc-langpack-mg-2.28-164.el8.x86_64.rpm glibc-langpack-mhr-2.28-164.el8.x86_64.rpm glibc-langpack-mi-2.28-164.el8.x86_64.rpm glibc-langpack-miq-2.28-164.el8.x86_64.rpm glibc-langpack-mjw-2.28-164.el8.x86_64.rpm glibc-langpack-mk-2.28-164.el8.x86_64.rpm glibc-langpack-ml-2.28-164.el8.x86_64.rpm glibc-langpack-mn-2.28-164.el8.x86_64.rpm glibc-langpack-mni-2.28-164.el8.x86_64.rpm glibc-langpack-mr-2.28-164.el8.x86_64.rpm glibc-langpack-ms-2.28-164.el8.x86_64.rpm glibc-langpack-mt-2.28-164.el8.x86_64.rpm glibc-langpack-my-2.28-164.el8.x86_64.rpm glibc-langpack-nan-2.28-164.el8.x86_64.rpm glibc-langpack-nb-2.28-164.el8.x86_64.rpm glibc-langpack-nds-2.28-164.el8.x86_64.rpm glibc-langpack-ne-2.28-164.el8.x86_64.rpm glibc-langpack-nhn-2.28-164.el8.x86_64.rpm glibc-langpack-niu-2.28-164.el8.x86_64.rpm glibc-langpack-nl-2.28-164.el8.x86_64.rpm glibc-langpack-nn-2.28-164.el8.x86_64.rpm glibc-langpack-nr-2.28-164.el8.x86_64.rpm glibc-langpack-nso-2.28-164.el8.x86_64.rpm glibc-langpack-oc-2.28-164.el8.x86_64.rpm glibc-langpack-om-2.28-164.el8.x86_64.rpm glibc-langpack-or-2.28-164.el8.x86_64.rpm glibc-langpack-os-2.28-164.el8.x86_64.rpm glibc-langpack-pa-2.28-164.el8.x86_64.rpm glibc-langpack-pap-2.28-164.el8.x86_64.rpm glibc-langpack-pl-2.28-164.el8.x86_64.rpm glibc-langpack-ps-2.28-164.el8.x86_64.rpm glibc-langpack-pt-2.28-164.el8.x86_64.rpm glibc-langpack-quz-2.28-164.el8.x86_64.rpm glibc-langpack-raj-2.28-164.el8.x86_64.rpm glibc-langpack-ro-2.28-164.el8.x86_64.rpm glibc-langpack-ru-2.28-164.el8.x86_64.rpm glibc-langpack-rw-2.28-164.el8.x86_64.rpm glibc-langpack-sa-2.28-164.el8.x86_64.rpm glibc-langpack-sah-2.28-164.el8.x86_64.rpm glibc-langpack-sat-2.28-164.el8.x86_64.rpm glibc-langpack-sc-2.28-164.el8.x86_64.rpm glibc-langpack-sd-2.28-164.el8.x86_64.rpm glibc-langpack-se-2.28-164.el8.x86_64.rpm glibc-langpack-sgs-2.28-164.el8.x86_64.rpm glibc-langpack-shn-2.28-164.el8.x86_64.rpm glibc-langpack-shs-2.28-164.el8.x86_64.rpm glibc-langpack-si-2.28-164.el8.x86_64.rpm glibc-langpack-sid-2.28-164.el8.x86_64.rpm glibc-langpack-sk-2.28-164.el8.x86_64.rpm glibc-langpack-sl-2.28-164.el8.x86_64.rpm glibc-langpack-sm-2.28-164.el8.x86_64.rpm glibc-langpack-so-2.28-164.el8.x86_64.rpm glibc-langpack-sq-2.28-164.el8.x86_64.rpm glibc-langpack-sr-2.28-164.el8.x86_64.rpm glibc-langpack-ss-2.28-164.el8.x86_64.rpm glibc-langpack-st-2.28-164.el8.x86_64.rpm glibc-langpack-sv-2.28-164.el8.x86_64.rpm glibc-langpack-sw-2.28-164.el8.x86_64.rpm glibc-langpack-szl-2.28-164.el8.x86_64.rpm glibc-langpack-ta-2.28-164.el8.x86_64.rpm glibc-langpack-tcy-2.28-164.el8.x86_64.rpm glibc-langpack-te-2.28-164.el8.x86_64.rpm glibc-langpack-tg-2.28-164.el8.x86_64.rpm glibc-langpack-th-2.28-164.el8.x86_64.rpm glibc-langpack-the-2.28-164.el8.x86_64.rpm glibc-langpack-ti-2.28-164.el8.x86_64.rpm glibc-langpack-tig-2.28-164.el8.x86_64.rpm glibc-langpack-tk-2.28-164.el8.x86_64.rpm glibc-langpack-tl-2.28-164.el8.x86_64.rpm glibc-langpack-tn-2.28-164.el8.x86_64.rpm glibc-langpack-to-2.28-164.el8.x86_64.rpm glibc-langpack-tpi-2.28-164.el8.x86_64.rpm glibc-langpack-tr-2.28-164.el8.x86_64.rpm glibc-langpack-ts-2.28-164.el8.x86_64.rpm glibc-langpack-tt-2.28-164.el8.x86_64.rpm glibc-langpack-ug-2.28-164.el8.x86_64.rpm glibc-langpack-uk-2.28-164.el8.x86_64.rpm glibc-langpack-unm-2.28-164.el8.x86_64.rpm glibc-langpack-ur-2.28-164.el8.x86_64.rpm glibc-langpack-uz-2.28-164.el8.x86_64.rpm glibc-langpack-ve-2.28-164.el8.x86_64.rpm glibc-langpack-vi-2.28-164.el8.x86_64.rpm glibc-langpack-wa-2.28-164.el8.x86_64.rpm glibc-langpack-wae-2.28-164.el8.x86_64.rpm glibc-langpack-wal-2.28-164.el8.x86_64.rpm glibc-langpack-wo-2.28-164.el8.x86_64.rpm glibc-langpack-xh-2.28-164.el8.x86_64.rpm glibc-langpack-yi-2.28-164.el8.x86_64.rpm glibc-langpack-yo-2.28-164.el8.x86_64.rpm glibc-langpack-yue-2.28-164.el8.x86_64.rpm glibc-langpack-yuw-2.28-164.el8.x86_64.rpm glibc-langpack-zh-2.28-164.el8.x86_64.rpm glibc-langpack-zu-2.28-164.el8.x86_64.rpm glibc-locale-source-2.28-164.el8.x86_64.rpm glibc-minimal-langpack-2.28-164.el8.x86_64.rpm libnsl-2.28-164.el8.i686.rpm libnsl-2.28-164.el8.x86_64.rpm nscd-2.28-164.el8.x86_64.rpm nss_db-2.28-164.el8.i686.rpm nss_db-2.28-164.el8.x86_64.rpm Red Hat Enterprise Linux CRB (v. 8): aarch64: glibc-benchtests-2.28-164.el8.aarch64.rpm glibc-debuginfo-2.28-164.el8.aarch64.rpm glibc-nss-devel-2.28-164.el8.aarch64.rpm glibc-static-2.28-164.el8.aarch64.rpm nss_hesiod-2.28-164.el8.aarch64.rpm ppc64le: glibc-benchtests-2.28-164.el8.ppc64le.rpm glibc-debuginfo-2.28-164.el8.ppc64le.rpm glibc-debuginfo-common-2.28-164.el8.ppc64le.rpm glibc-nss-devel-2.28-164.el8.ppc64le.rpm glibc-static-2.28-164.el8.ppc64le.rpm nss_hesiod-2.28-164.el8.ppc64le.rpm s390x: glibc-benchtests-2.28-164.el8.s390x.rpm glibc-debuginfo-2.28-164.el8.s390x.rpm glibc-debuginfo-common-2.28-164.el8.s390x.rpm glibc-nss-devel-2.28-164.el8.s390x.rpm glibc-static-2.28-164.el8.s390x.rpm nss_hesiod-2.28-164.el8.s390x.rpm x86_64: glibc-benchtests-2.28-164.el8.x86_64.rpm glibc-debuginfo-2.28-164.el8.i686.rpm glibc-debuginfo-2.28-164.el8.x86_64.rpm glibc-debuginfo-common-2.28-164.el8.i686.rpm glibc-debuginfo-common-2.28-164.el8.x86_64.rpm glibc-nss-devel-2.28-164.el8.i686.rpm glibc-nss-devel-2.28-164.el8.x86_64.rpm glibc-static-2.28-164.el8.i686.rpm glibc-static-2.28-164.el8.x86_64.rpm nss_hesiod-2.28-164.el8.i686.rpm nss_hesiod-2.28-164.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-27645 https://access.redhat.com/security/cve/CVE-2021-33574 https://access.redhat.com/security/cve/CVE-2021-35942 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYYreQ9zjgjWX9erEAQhH6Q//Sbg528iEujRXW+yNO7ZtLCcgn8oDHgiD TvPa6VRcP/E4lByAPC3fGxxrcoXnDbD+vB2Ew/R1l4rAT1WP/WCaqX+gY1b4eVLU HxsZAfg849CCe4k0Bai5MtB/BU6/WEIUD5ACACEhIPfgPoNUONAeZLmNPFRj3Rpj Sk3NmXlG9lkkrfGexwGokGDPsq62pZqwbF+oPkTfCFFvbzrBF/sS8CfkB5Rws8tM aBJXEgpnyJlDJ0FDoQ7yuSVZNfuVbnFcJmAWr8c+eeR46C0aWfl3ETxNbcNCCuUj dTBjthu7ZG/88DuOVQwGIZOyC8HNwhzVIHPK0SVmCJeF3eHULJ1mYwaBqQ6YzwuP TCox0iZMA7vHsGvB0OCJbARfZKeIJTe7T9vqQxOGaOdI5QgttZObgLJub4Y8kjiq 61Mxx5pKumqRy/k0p9SAn0oHbXC9iholWg/TWblj31TJY4FXMLTzJckt96IjYyTq LskhunzwcwE3FtmlYBVc4nDty/+lTnUbMFrxynPng8obd0sRINn/ZEoZF32iLjoB LUs04wy0iG2segTBbbG+Se80NnjABc8Eedy+ksycT1PAt1sWfLfqUO3OFsN+0995 u+mDEbqXullTWozC3o/AUzsDGS/Cf2EFEPjhfcoxecQRqj+jG316CnBRyY0juSK1 qL31MTX7XJI=i/Jb -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/): 2050826 - CVE-2022-24348 gitops: Path traversal and dereference of symlinks when passing Helm value files 5. Solution: For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment 5. JIRA issues fixed (https://issues.jboss.org/): LOG-1168 - Disable hostname verification in syslog TLS settings LOG-1235 - Using HTTPS without a secret does not translate into the correct 'scheme' value in Fluentd LOG-1375 - ssl_ca_cert should be optional LOG-1378 - CLO should support sasl_plaintext(Password over http) LOG-1392 - In fluentd config, flush_interval can't be set with flush_mode=immediate LOG-1494 - Syslog output is serializing json incorrectly LOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server LOG-1575 - Rejected by Elasticsearch and unexpected json-parsing LOG-1735 - Regression introducing flush_at_shutdown LOG-1774 - The collector logs should be excluded in fluent.conf LOG-1776 - fluentd total_limit_size sets value beyond available space LOG-1822 - OpenShift Alerting Rules Style-Guide Compliance LOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled LOG-1862 - Unsupported kafka parameters when enabled Kafka SASL LOG-1903 - Fix the Display of ClusterLogging type in OLM LOG-1911 - CLF API changes to Opt-in to multiline error detection LOG-1918 - Alert `FluentdNodeDown` always firing LOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding 6. Bugs fixed (https://bugzilla.redhat.com/): 1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option 1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option 5. Summary: The Migration Toolkit for Containers (MTC) 1.5.2 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Solution: For details on how to install and use MTC, refer to: https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2000734 - CVE-2021-3757 nodejs-immer: prototype pollution may lead to DoS or remote code execution 2005438 - Combining Rsync and Stunnel in a single pod can degrade performance (1.5 backport) 2006842 - MigCluster CR remains in "unready" state and source registry is inaccessible after temporary shutdown of source cluster 2007429 - "oc describe" and "oc log" commands on "Migration resources" tree cannot be copied after failed migration 2022017 - CVE-2021-3948 mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC) 5. Bugs fixed (https://bugzilla.redhat.com/): 1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet 1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic 5

Trust: 1.89

sources: NVD: CVE-2021-33574 // VULHUB: VHN-393646 // VULMON: CVE-2021-33574 // PACKETSTORM: 165296 // PACKETSTORM: 165286 // PACKETSTORM: 165287 // PACKETSTORM: 164863 // PACKETSTORM: 166051 // PACKETSTORM: 164967 // PACKETSTORM: 165002 // PACKETSTORM: 165099 // PACKETSTORM: 165758

AFFECTED PRODUCTS

vendor:netappmodel:h700escope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:11.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:11.70.1

Trust: 1.0

vendor:netappmodel:h500escope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300escope:eqversion: -

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.32

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.33

Trust: 1.0

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

sources: NVD: CVE-2021-33574

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33574
value: CRITICAL

Trust: 1.0

CNNVD: CNNVD-202105-1666
value: CRITICAL

Trust: 0.6

VULHUB: VHN-393646
value: HIGH

Trust: 0.1

VULMON: CVE-2021-33574
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-33574
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-393646
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-33574
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-393646 // VULMON: CVE-2021-33574 // CNNVD: CNNVD-202105-1666 // NVD: CVE-2021-33574

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

sources: VULHUB: VHN-393646 // NVD: CVE-2021-33574

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-1666

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202105-1666

PATCH

title:Debian CVElist Bug Report Logs: glibc: CVE-2021-33574: mq_notify does not handle separately allocated thread attributesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=7a9966ec919351d3328669aa69ea5e39

Trust: 0.1

title:Red Hat: CVE-2021-33574url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-33574

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1736url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1736

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-33574 log

Trust: 0.1

title:Red Hat: Moderate: Release of OpenShift Serverless 1.20.0url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220434 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift distributed tracing 2.1.0 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220318 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Release of containers for OSP 16.2 director operator tech previewurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220842 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220580 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.2.11 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220856 - Security Advisory

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-33574

Trust: 0.1

title:CVE-2021-33574url:https://github.com/JamesGeee/CVE-2021-33574

Trust: 0.1

title:cks-notesurl:https://github.com/ruzickap/cks-notes

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-38604

Trust: 0.1

title:ochacafe-s5-3url:https://github.com/oracle-japan/ochacafe-s5-3

Trust: 0.1

sources: VULMON: CVE-2021-33574

EXTERNAL IDS

db:NVDid:CVE-2021-33574

Trust: 2.7

db:PACKETSTORMid:165758

Trust: 0.8

db:PACKETSTORMid:166051

Trust: 0.8

db:PACKETSTORMid:164863

Trust: 0.8

db:CNNVDid:CNNVD-202105-1666

Trust: 0.7

db:PACKETSTORMid:166308

Trust: 0.7

db:PACKETSTORMid:163406

Trust: 0.7

db:PACKETSTORMid:165862

Trust: 0.7

db:CS-HELPid:SB2021092807

Trust: 0.6

db:CS-HELPid:SB2021070604

Trust: 0.6

db:CS-HELPid:SB2021100416

Trust: 0.6

db:AUSCERTid:ESB-2021.3935

Trust: 0.6

db:AUSCERTid:ESB-2021.4254

Trust: 0.6

db:AUSCERTid:ESB-2021.4172

Trust: 0.6

db:AUSCERTid:ESB-2022.0394

Trust: 0.6

db:AUSCERTid:ESB-2021.3785

Trust: 0.6

db:AUSCERTid:ESB-2021.4095

Trust: 0.6

db:AUSCERTid:ESB-2021.4019

Trust: 0.6

db:AUSCERTid:ESB-2021.3905

Trust: 0.6

db:AUSCERTid:ESB-2021.4229

Trust: 0.6

db:AUSCERTid:ESB-2021.4059

Trust: 0.6

db:AUSCERTid:ESB-2022.5140

Trust: 0.6

db:AUSCERTid:ESB-2021.3214

Trust: 0.6

db:AUSCERTid:ESB-2022.0245

Trust: 0.6

db:AUSCERTid:ESB-2021.3336

Trust: 0.6

db:AUSCERTid:ESB-2022.0716

Trust: 0.6

db:AUSCERTid:ESB-2022.1071

Trust: 0.6

db:AUSCERTid:ESB-2022.0493

Trust: 0.6

db:AUSCERTid:ESB-2021.3398

Trust: 0.6

db:VULHUBid:VHN-393646

Trust: 0.1

db:VULMONid:CVE-2021-33574

Trust: 0.1

db:PACKETSTORMid:165296

Trust: 0.1

db:PACKETSTORMid:165286

Trust: 0.1

db:PACKETSTORMid:165287

Trust: 0.1

db:PACKETSTORMid:164967

Trust: 0.1

db:PACKETSTORMid:165002

Trust: 0.1

db:PACKETSTORMid:165099

Trust: 0.1

sources: VULHUB: VHN-393646 // VULMON: CVE-2021-33574 // PACKETSTORM: 165296 // PACKETSTORM: 165286 // PACKETSTORM: 165287 // PACKETSTORM: 164863 // PACKETSTORM: 166051 // PACKETSTORM: 164967 // PACKETSTORM: 165002 // PACKETSTORM: 165099 // PACKETSTORM: 165758 // CNNVD: CNNVD-202105-1666 // NVD: CVE-2021-33574

REFERENCES

url:https://security.netapp.com/advisory/ntap-20210629-0005/

Trust: 1.7

url:https://security.gentoo.org/glsa/202107-07

Trust: 1.7

url:https://sourceware.org/bugzilla/show_bug.cgi?id=27896

Trust: 1.7

url:https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/kjyyimddyohtp2porlabtohyqyyrezdd/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/rbuuwugxvilqxvweou7n42ichpjnaeup/

Trust: 1.0

url:https://access.redhat.com/security/cve/cve-2021-27645

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2021-33574

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2021-35942

Trust: 0.9

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/rbuuwugxvilqxvweou7n42ichpjnaeup/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/kjyyimddyohtp2porlabtohyqyyrezdd/

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2021-3572

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2021-20266

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2021-3426

Trust: 0.7

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-14145

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-14145

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2021-3778

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2021-3796

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0245

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3905

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6526524

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1071

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4019

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3398

Trust: 0.6

url:https://packetstormsecurity.com/files/165862/red-hat-security-advisory-2022-0434-05.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5140

Trust: 0.6

url:https://vigilance.fr/vulnerability/glibc-use-after-free-via-mq-notify-35692

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3336

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3214

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0716

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092807

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0394

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0493

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3935

Trust: 0.6

url:https://packetstormsecurity.com/files/164863/red-hat-security-advisory-2021-4358-03.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4229

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4059

Trust: 0.6

url:https://packetstormsecurity.com/files/166051/red-hat-security-advisory-2022-0580-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070604

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021100416

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4254

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3785

Trust: 0.6

url:https://packetstormsecurity.com/files/165758/red-hat-security-advisory-2022-0318-06.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4095

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4172

Trust: 0.6

url:https://packetstormsecurity.com/files/163406/gentoo-linux-security-advisory-202107-07.html

Trust: 0.6

url:https://packetstormsecurity.com/files/166308/red-hat-security-advisory-2022-0842-01.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-20673

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-3712

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-23841

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-20673

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-23840

Trust: 0.5

url:https://issues.jboss.org/):

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-25013

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-25012

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-35522

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-35524

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-25013

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-25009

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-43527

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2018-25014

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2018-25012

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-35521

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-17541

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-36331

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-31535

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-36330

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-36332

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-25010

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-17541

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-25014

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3481

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2018-25009

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2018-25010

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-35523

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-27645

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-22876

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-20231

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-22925

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-22898

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-20232

Trust: 0.4

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-009

Trust: 0.3

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-44228

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33574

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-28153

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-20266

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24504

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-27777

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20239

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36158

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35448

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3635

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20284

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36386

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-0427

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24586

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3348

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26140

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3487

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26146

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31440

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3732

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-0129

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10001

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24502

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3564

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-0427

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-23133

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26144

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3679

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36312

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-29368

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24588

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-29646

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-29155

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3489

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-29660

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26139

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28971

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14615

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26143

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3600

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26145

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33200

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-29650

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33033

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20194

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26147

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31916

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10001

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24503

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14615

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24502

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31829

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3573

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20197

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-26141

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28950

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24587

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24503

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3659

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35524

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35522

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-37136

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35523

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-37137

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-21409

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-36330

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35521

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33560

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-37750

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3200

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-23841

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-23840

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2021:5137

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5128

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20317

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43267

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36331

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5127

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-35942

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0580

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-40346

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4658

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39241

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24348

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44790

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4658

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33194

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23369

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23383

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23369

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23383

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4032

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3757

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33930

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33928

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22947

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3948

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22947

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33929

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36222

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3620

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3445

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/distr_tracing/distributed-tracing-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0318

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29923

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36221

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3426

Trust: 0.1

sources: VULHUB: VHN-393646 // PACKETSTORM: 165296 // PACKETSTORM: 165286 // PACKETSTORM: 165287 // PACKETSTORM: 164863 // PACKETSTORM: 166051 // PACKETSTORM: 164967 // PACKETSTORM: 165002 // PACKETSTORM: 165099 // PACKETSTORM: 165758 // CNNVD: CNNVD-202105-1666 // NVD: CVE-2021-33574

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 165296 // PACKETSTORM: 165286 // PACKETSTORM: 165287 // PACKETSTORM: 164863 // PACKETSTORM: 166051 // PACKETSTORM: 164967 // PACKETSTORM: 165002 // PACKETSTORM: 165099 // PACKETSTORM: 165758

SOURCES

db:VULHUBid:VHN-393646
db:VULMONid:CVE-2021-33574
db:PACKETSTORMid:165296
db:PACKETSTORMid:165286
db:PACKETSTORMid:165287
db:PACKETSTORMid:164863
db:PACKETSTORMid:166051
db:PACKETSTORMid:164967
db:PACKETSTORMid:165002
db:PACKETSTORMid:165099
db:PACKETSTORMid:165758
db:CNNVDid:CNNVD-202105-1666
db:NVDid:CVE-2021-33574

LAST UPDATE DATE

2025-01-03T21:14:16.497000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-393646date:2022-11-08T00:00:00
db:VULMONid:CVE-2021-33574date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202105-1666date:2022-10-18T00:00:00
db:NVDid:CVE-2021-33574date:2023-11-07T03:35:52.810

SOURCES RELEASE DATE

db:VULHUBid:VHN-393646date:2021-05-25T00:00:00
db:VULMONid:CVE-2021-33574date:2021-05-25T00:00:00
db:PACKETSTORMid:165296date:2021-12-15T15:27:05
db:PACKETSTORMid:165286date:2021-12-15T15:20:33
db:PACKETSTORMid:165287date:2021-12-15T15:20:43
db:PACKETSTORMid:164863date:2021-11-10T17:08:43
db:PACKETSTORMid:166051date:2022-02-18T16:37:39
db:PACKETSTORMid:164967date:2021-11-15T17:25:56
db:PACKETSTORMid:165002date:2021-11-17T15:25:40
db:PACKETSTORMid:165099date:2021-11-30T14:44:48
db:PACKETSTORMid:165758date:2022-01-28T14:33:13
db:CNNVDid:CNNVD-202105-1666date:2021-05-25T00:00:00
db:NVDid:CVE-2021-33574date:2021-05-25T22:15:10.410