ID

VAR-202111-1603


CVE

CVE-2021-41229


TITLE

BlueZ  Vulnerability regarding lack of memory release after expiration in

Trust: 0.8

sources: JVNDB: JVNDB-2021-014847

DESCRIPTION

BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash. BlueZ Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. BlueZ has a resource management error vulnerability. The vulnerability stems from a vulnerability in the cstate alloc buf of the sdp in the affected version. ========================================================================== Ubuntu Security Notice USN-5155-1 November 23, 2021 bluez vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 21.04 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in BlueZ. Software Description: - bluez: Bluetooth tools and daemons Details: It was discovered that BlueZ incorrectly handled the Discoverable status when a device is powered down. This could result in devices being powered up discoverable, contrary to expectations. This issue only affected Ubuntu 20.04 LTS, Ubuntu 21.04, and Ubuntu 21.10. (CVE-2021-3658) It was discovered that BlueZ incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause BlueZ to consume resources, leading to a denial of service. (CVE-2021-41229) It was discovered that the BlueZ gatt server incorrectly handled disconnects. (CVE-2021-43400) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: bluez 5.60-0ubuntu2.1 libbluetooth3 5.60-0ubuntu2.1 Ubuntu 21.04: bluez 5.56-0ubuntu4.3 libbluetooth3 5.56-0ubuntu4.3 Ubuntu 20.04 LTS: bluez 5.53-0ubuntu3.4 libbluetooth3 5.53-0ubuntu3.4 Ubuntu 18.04 LTS: bluez 5.48-0ubuntu3.6 libbluetooth3 5.48-0ubuntu3.6 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Low: bluez security update Advisory ID: RHSA-2022:2081-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2081 Issue date: 2022-05-10 CVE Names: CVE-2021-41229 ===================================================================== 1. Summary: An update for bluez is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Red Hat), and pcmcia configuration files. Security Fix(es): * bluez: memory leak in the SDP protocol (CVE-2021-41229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2025034 - CVE-2021-41229 bluez: memory leak in the SDP protocol 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): aarch64: bluez-cups-5.56-3.el8.aarch64.rpm bluez-cups-debuginfo-5.56-3.el8.aarch64.rpm bluez-debuginfo-5.56-3.el8.aarch64.rpm bluez-debugsource-5.56-3.el8.aarch64.rpm bluez-hid2hci-debuginfo-5.56-3.el8.aarch64.rpm bluez-libs-debuginfo-5.56-3.el8.aarch64.rpm bluez-obexd-debuginfo-5.56-3.el8.aarch64.rpm ppc64le: bluez-cups-5.56-3.el8.ppc64le.rpm bluez-cups-debuginfo-5.56-3.el8.ppc64le.rpm bluez-debuginfo-5.56-3.el8.ppc64le.rpm bluez-debugsource-5.56-3.el8.ppc64le.rpm bluez-hid2hci-debuginfo-5.56-3.el8.ppc64le.rpm bluez-libs-debuginfo-5.56-3.el8.ppc64le.rpm bluez-obexd-debuginfo-5.56-3.el8.ppc64le.rpm s390x: bluez-cups-5.56-3.el8.s390x.rpm bluez-cups-debuginfo-5.56-3.el8.s390x.rpm bluez-debuginfo-5.56-3.el8.s390x.rpm bluez-debugsource-5.56-3.el8.s390x.rpm bluez-hid2hci-debuginfo-5.56-3.el8.s390x.rpm bluez-libs-debuginfo-5.56-3.el8.s390x.rpm bluez-obexd-debuginfo-5.56-3.el8.s390x.rpm x86_64: bluez-cups-5.56-3.el8.x86_64.rpm bluez-cups-debuginfo-5.56-3.el8.x86_64.rpm bluez-debuginfo-5.56-3.el8.x86_64.rpm bluez-debugsource-5.56-3.el8.x86_64.rpm bluez-hid2hci-debuginfo-5.56-3.el8.x86_64.rpm bluez-libs-debuginfo-5.56-3.el8.x86_64.rpm bluez-obexd-debuginfo-5.56-3.el8.x86_64.rpm Red Hat Enterprise Linux BaseOS (v. 8): Source: bluez-5.56-3.el8.src.rpm aarch64: bluez-5.56-3.el8.aarch64.rpm bluez-cups-debuginfo-5.56-3.el8.aarch64.rpm bluez-debuginfo-5.56-3.el8.aarch64.rpm bluez-debugsource-5.56-3.el8.aarch64.rpm bluez-hid2hci-5.56-3.el8.aarch64.rpm bluez-hid2hci-debuginfo-5.56-3.el8.aarch64.rpm bluez-libs-5.56-3.el8.aarch64.rpm bluez-libs-debuginfo-5.56-3.el8.aarch64.rpm bluez-obexd-5.56-3.el8.aarch64.rpm bluez-obexd-debuginfo-5.56-3.el8.aarch64.rpm ppc64le: bluez-5.56-3.el8.ppc64le.rpm bluez-cups-debuginfo-5.56-3.el8.ppc64le.rpm bluez-debuginfo-5.56-3.el8.ppc64le.rpm bluez-debugsource-5.56-3.el8.ppc64le.rpm bluez-hid2hci-5.56-3.el8.ppc64le.rpm bluez-hid2hci-debuginfo-5.56-3.el8.ppc64le.rpm bluez-libs-5.56-3.el8.ppc64le.rpm bluez-libs-debuginfo-5.56-3.el8.ppc64le.rpm bluez-obexd-5.56-3.el8.ppc64le.rpm bluez-obexd-debuginfo-5.56-3.el8.ppc64le.rpm s390x: bluez-5.56-3.el8.s390x.rpm bluez-cups-debuginfo-5.56-3.el8.s390x.rpm bluez-debuginfo-5.56-3.el8.s390x.rpm bluez-debugsource-5.56-3.el8.s390x.rpm bluez-hid2hci-5.56-3.el8.s390x.rpm bluez-hid2hci-debuginfo-5.56-3.el8.s390x.rpm bluez-libs-5.56-3.el8.s390x.rpm bluez-libs-debuginfo-5.56-3.el8.s390x.rpm bluez-obexd-5.56-3.el8.s390x.rpm bluez-obexd-debuginfo-5.56-3.el8.s390x.rpm x86_64: bluez-5.56-3.el8.x86_64.rpm bluez-cups-debuginfo-5.56-3.el8.i686.rpm bluez-cups-debuginfo-5.56-3.el8.x86_64.rpm bluez-debuginfo-5.56-3.el8.i686.rpm bluez-debuginfo-5.56-3.el8.x86_64.rpm bluez-debugsource-5.56-3.el8.i686.rpm bluez-debugsource-5.56-3.el8.x86_64.rpm bluez-hid2hci-5.56-3.el8.x86_64.rpm bluez-hid2hci-debuginfo-5.56-3.el8.i686.rpm bluez-hid2hci-debuginfo-5.56-3.el8.x86_64.rpm bluez-libs-5.56-3.el8.i686.rpm bluez-libs-5.56-3.el8.x86_64.rpm bluez-libs-debuginfo-5.56-3.el8.i686.rpm bluez-libs-debuginfo-5.56-3.el8.x86_64.rpm bluez-obexd-5.56-3.el8.x86_64.rpm bluez-obexd-debuginfo-5.56-3.el8.i686.rpm bluez-obexd-debuginfo-5.56-3.el8.x86_64.rpm Red Hat CodeReady Linux Builder (v. 8): aarch64: bluez-cups-debuginfo-5.56-3.el8.aarch64.rpm bluez-debuginfo-5.56-3.el8.aarch64.rpm bluez-debugsource-5.56-3.el8.aarch64.rpm bluez-hid2hci-debuginfo-5.56-3.el8.aarch64.rpm bluez-libs-debuginfo-5.56-3.el8.aarch64.rpm bluez-libs-devel-5.56-3.el8.aarch64.rpm bluez-obexd-debuginfo-5.56-3.el8.aarch64.rpm ppc64le: bluez-cups-debuginfo-5.56-3.el8.ppc64le.rpm bluez-debuginfo-5.56-3.el8.ppc64le.rpm bluez-debugsource-5.56-3.el8.ppc64le.rpm bluez-hid2hci-debuginfo-5.56-3.el8.ppc64le.rpm bluez-libs-debuginfo-5.56-3.el8.ppc64le.rpm bluez-libs-devel-5.56-3.el8.ppc64le.rpm bluez-obexd-debuginfo-5.56-3.el8.ppc64le.rpm s390x: bluez-cups-debuginfo-5.56-3.el8.s390x.rpm bluez-debuginfo-5.56-3.el8.s390x.rpm bluez-debugsource-5.56-3.el8.s390x.rpm bluez-hid2hci-debuginfo-5.56-3.el8.s390x.rpm bluez-libs-debuginfo-5.56-3.el8.s390x.rpm bluez-libs-devel-5.56-3.el8.s390x.rpm bluez-obexd-debuginfo-5.56-3.el8.s390x.rpm x86_64: bluez-cups-debuginfo-5.56-3.el8.i686.rpm bluez-cups-debuginfo-5.56-3.el8.x86_64.rpm bluez-debuginfo-5.56-3.el8.i686.rpm bluez-debuginfo-5.56-3.el8.x86_64.rpm bluez-debugsource-5.56-3.el8.i686.rpm bluez-debugsource-5.56-3.el8.x86_64.rpm bluez-hid2hci-debuginfo-5.56-3.el8.i686.rpm bluez-hid2hci-debuginfo-5.56-3.el8.x86_64.rpm bluez-libs-debuginfo-5.56-3.el8.i686.rpm bluez-libs-debuginfo-5.56-3.el8.x86_64.rpm bluez-libs-devel-5.56-3.el8.i686.rpm bluez-libs-devel-5.56-3.el8.x86_64.rpm bluez-obexd-debuginfo-5.56-3.el8.i686.rpm bluez-obexd-debuginfo-5.56-3.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-41229 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnqRLtzjgjWX9erEAQhLSQ//ZwYEUw8IqRkMhaXHWMrPk50APquWo/Dk gIcV1Slmo0NTJMHosbYiJ6PFzQKcrPO36c1pXjPewLSvzY2Y8yp55E9Y9kUTMENn Ue2wFrM9hFqFhACbZlVDViwsnj9gp18n9DfPrtJzU0py8jJrkm1KMyiqtUzkoA6r P0jQl0q7GtU5TCerU8QOpc2bWcaOXD6dT5AwcgOWDyQ9CU38nuIXGrcdf6JkXybx T8nWOA4FNBMW5X0uISgeMrsxI0eT8sn0ww+i/cnOOA9QczqpKxy682NFbsWDwQWY u09h4MD4Voi+Skq/YTl4SWggsARXzHkq+MlTXLEGMdDMZcjOhB7eCkc9oIsXj9k6 fHc27bHU7TQRy2y5w/poDnU6LOlnavQAHT0LrDNj7PdCfZbvqorPSckrebkls7Ci iMo068XlAfWfIDT57yFEZNbd0WA+bVNZcPtQLzIVil8lxrSTtxXGC49xnNLA3Lay 87uJbXZLUsgC0PUHx1No2QYpqRCnDdamkh07R0OaMROyZZPyO3BGeyUHKtFNW6Zz UUlv1NwXN3d9E6K3mvaBQqYGbVae22y8SrJOL/qLM7e8E/FO2MM7kSzbdbwHTEIJ JWJomZXVtQkoQW0uw5REUleCDnrsfAkqgwsZAtmHXOcPBP6tlbR8o+BFUXo54J6S SSXzvHgRCmU= =VeS/ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.43

sources: NVD: CVE-2021-41229 // JVNDB: JVNDB-2021-014847 // CNVD: CNVD-2021-92546 // VULMON: CVE-2021-41229 // PACKETSTORM: 165065 // PACKETSTORM: 167064

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-92546

AFFECTED PRODUCTS

vendor:bluezmodel:bluezscope:eqversion:5.58

Trust: 1.6

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:bluezmodel:bluezscope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2021-92546 // JVNDB: JVNDB-2021-014847 // NVD: CVE-2021-41229

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-41229
value: MEDIUM

Trust: 1.0

security-advisories@github.com: CVE-2021-41229
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-41229
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-92546
value: LOW

Trust: 0.6

CNNVD: CNNVD-202111-1194
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-41229
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-41229
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-92546
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-41229
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

security-advisories@github.com: CVE-2021-41229
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-41229
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-92546 // VULMON: CVE-2021-41229 // JVNDB: JVNDB-2021-014847 // CNNVD: CNNVD-202111-1194 // NVD: CVE-2021-41229 // NVD: CVE-2021-41229

PROBLEMTYPE DATA

problemtype:CWE-401

Trust: 1.0

problemtype:CWE-400

Trust: 1.0

problemtype:Lack of memory release after expiration (CWE-401) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-014847 // NVD: CVE-2021-41229

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202111-1194

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202111-1194

PATCH

title:[SECURITY] [DLA 3157-1] bluez security updateurl:https://github.com/bluez/bluez/security/advisories/GHSA-3fqg-r8j5-f5xq

Trust: 0.8

title:Patch for BlueZ resource management error vulnerability (CNVD-2021-92546)url:https://www.cnvd.org.cn/patchInfo/show/302016

Trust: 0.6

title:BlueZ Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=169753

Trust: 0.6

title:Red Hat: Low: bluez security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222081 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: bluez: CVE-2021-41229: memory leak in the SDP protocol handlingurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=1cd5f4b800120c27588e61161129b32a

Trust: 0.1

title:Red Hat: CVE-2021-41229url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-41229

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-41229 log

Trust: 0.1

sources: CNVD: CNVD-2021-92546 // VULMON: CVE-2021-41229 // JVNDB: JVNDB-2021-014847 // CNNVD: CNNVD-202111-1194

EXTERNAL IDS

db:NVDid:CVE-2021-41229

Trust: 4.1

db:JVNDBid:JVNDB-2021-014847

Trust: 0.8

db:PACKETSTORMid:165065

Trust: 0.7

db:PACKETSTORMid:167064

Trust: 0.7

db:CNVDid:CNVD-2021-92546

Trust: 0.6

db:AUSCERTid:ESB-2021.3989

Trust: 0.6

db:AUSCERTid:ESB-2021.4011

Trust: 0.6

db:AUSCERTid:ESB-2022.5318

Trust: 0.6

db:CNNVDid:CNNVD-202111-1194

Trust: 0.6

db:VULMONid:CVE-2021-41229

Trust: 0.1

sources: CNVD: CNVD-2021-92546 // VULMON: CVE-2021-41229 // JVNDB: JVNDB-2021-014847 // PACKETSTORM: 165065 // PACKETSTORM: 167064 // CNNVD: CNNVD-202111-1194 // NVD: CVE-2021-41229

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-41229

Trust: 2.2

url:https://github.com/bluez/bluez/security/advisories/ghsa-3fqg-r8j5-f5xq

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/11/msg00022.html

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20211203-0004/

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html

Trust: 1.6

url:https://www.auscert.org.au/bulletins/esb-2022.5318

Trust: 0.6

url:https://vigilance.fr/vulnerability/bluez-memory-leak-via-sdp-cstate-alloc-buf-36954

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4011

Trust: 0.6

url:https://packetstormsecurity.com/files/165065/ubuntu-security-notice-usn-5155-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167064/red-hat-security-advisory-2022-2081-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3989

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2022:2081

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/401.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://security.archlinux.org/cve-2021-41229

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bluez/5.60-0ubuntu2.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43400

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5155-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bluez/5.56-0ubuntu4.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3658

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bluez/5.48-0ubuntu3.6

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bluez/5.53-0ubuntu3.4

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-41229

Trust: 0.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

sources: CNVD: CNVD-2021-92546 // VULMON: CVE-2021-41229 // JVNDB: JVNDB-2021-014847 // PACKETSTORM: 165065 // PACKETSTORM: 167064 // CNNVD: CNNVD-202111-1194 // NVD: CVE-2021-41229

CREDITS

Ubuntu

Trust: 0.1

sources: PACKETSTORM: 165065

SOURCES

db:CNVDid:CNVD-2021-92546
db:VULMONid:CVE-2021-41229
db:JVNDBid:JVNDB-2021-014847
db:PACKETSTORMid:165065
db:PACKETSTORMid:167064
db:CNNVDid:CNNVD-202111-1194
db:NVDid:CVE-2021-41229

LAST UPDATE DATE

2024-08-14T12:23:34.536000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-92546date:2021-11-30T00:00:00
db:VULMONid:CVE-2021-41229date:2022-04-25T00:00:00
db:JVNDBid:JVNDB-2021-014847date:2022-10-28T08:18:00
db:CNNVDid:CNNVD-202111-1194date:2022-10-25T00:00:00
db:NVDid:CVE-2021-41229date:2022-11-07T17:25:33.773

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-92546date:2021-11-30T00:00:00
db:VULMONid:CVE-2021-41229date:2021-11-12T00:00:00
db:JVNDBid:JVNDB-2021-014847date:2022-10-28T00:00:00
db:PACKETSTORMid:165065date:2021-11-24T16:35:03
db:PACKETSTORMid:167064date:2022-05-11T16:30:09
db:CNNVDid:CNNVD-202111-1194date:2021-11-12T00:00:00
db:NVDid:CVE-2021-41229date:2021-11-12T23:15:08.857