ID

VAR-202202-0082


CVE

CVE-2021-0145


TITLE

plural  Intel(R) Processor  Initialization vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-005263

DESCRIPTION

Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. plural Intel(R) Processor Has an initialization vulnerability.Information may be obtained. ========================================================================== Ubuntu Security Notice USN-5535-1 July 28, 2022 Intel Microcode vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Several security issues were fixed in Intel Microcode. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. (CVE-2021-0145) Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges. (CVE-2021-0146) It was discovered that some Intel processors did not implement sufficient control flow management. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-0127) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123, CVE-2022-21127) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that some Intel processors improperly optimised security-critical code. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21151) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) It was discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information. (CVE-2021-33117) Brandon Miller discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information or a remote attacker could use this to cause a denial of service (system crash). (CVE-2021-33120) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: intel-microcode 3.20220510.0ubuntu0.16.04.1+esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5535-1 CVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117, CVE-2021-33120, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21151, CVE-2022-21166

Trust: 1.98

sources: NVD: CVE-2021-0145 // JVNDB: JVNDB-2022-005263 // VULHUB: VHN-371714 // VULMON: CVE-2021-0145 // PACKETSTORM: 167553 // PACKETSTORM: 167862

AFFECTED PRODUCTS

vendor:intelmodel:core i5-1145g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11375hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1195g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-11100hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1120g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8358pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185g7escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8368qscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1000g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8362scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11555mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1060g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11155mlescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11850hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1350pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8354hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11555mlescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11955mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1005g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1140g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11980hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2388gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1000g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2336scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1160g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1155g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8356hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1030g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2334scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1125g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8351nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1165g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8368scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8376hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1110g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2378gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8358scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1370pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11155mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1130g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1030g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6600hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2386gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8353hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145g7escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8376hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6305escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11855mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6305scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1065g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2378scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1180g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2356gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11800hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11260hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11390hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11865mlescope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 7505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1135g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2314scope:eqversion: -

Trust: 1.0

vendor:netappmodel:fas\/aff biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11320hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2374gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11370hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11865mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11950hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2324gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8321hcscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115g4escope:eqversion: -

Trust: 1.0

vendor:インテルmodel:intel core i3-11100hescope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 6600hescope: - version: -

Trust: 0.8

vendor:インテルmodel:intel core i3-1000g4scope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 6305escope: - version: -

Trust: 0.8

vendor:インテルmodel:intel core i3-1115g4scope: - version: -

Trust: 0.8

vendor:netappmodel:fas/aff biosscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel core i3-1110g4scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel core i3-1000g1scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel core i3-1005g1scope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 6305scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-005263 // NVD: CVE-2021-0145

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-0145
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-0145
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202202-663
value: MEDIUM

Trust: 0.6

VULHUB: VHN-371714
value: LOW

Trust: 0.1

VULMON: CVE-2021-0145
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-0145
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-371714
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-0145
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-0145
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-371714 // VULMON: CVE-2021-0145 // JVNDB: JVNDB-2022-005263 // CNNVD: CNNVD-202202-663 // NVD: CVE-2021-0145

PROBLEMTYPE DATA

problemtype:CWE-665

Trust: 1.1

problemtype:Improper initialization (CWE-665) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-371714 // JVNDB: JVNDB-2022-005263 // NVD: CVE-2021-0145

THREAT TYPE

local

Trust: 0.8

sources: PACKETSTORM: 167553 // PACKETSTORM: 167862 // CNNVD: CNNVD-202202-663

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202202-663

PATCH

title:NTAP-20220210-0009 Intel Intel Product Security Centerurl:https://security.netapp.com/advisory/ntap-20220210-0009/

Trust: 0.8

title:Intel Processors BIOS firmware Repair measures for information disclosure vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=181741

Trust: 0.6

title:Red Hat: CVE-2021-0145url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-0145

Trust: 0.1

title:Ubuntu Security Notice: USN-5486-1: Intel Microcode vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5486-1

Trust: 0.1

title:Citrix Security Bulletins: Security Advisory for Citrix Hypervisorurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=c190190ecb78bfb6de464ad7330e2640

Trust: 0.1

sources: VULMON: CVE-2021-0145 // JVNDB: JVNDB-2022-005263 // CNNVD: CNNVD-202202-663

EXTERNAL IDS

db:NVDid:CVE-2021-0145

Trust: 3.6

db:PACKETSTORMid:167862

Trust: 0.8

db:PACKETSTORMid:167553

Trust: 0.8

db:JVNid:JVNVU99045838

Trust: 0.8

db:JVNDBid:JVNDB-2022-005263

Trust: 0.8

db:CS-HELPid:SB2022021005

Trust: 0.6

db:CS-HELPid:SB2022062041

Trust: 0.6

db:AUSCERTid:ESB-2022.0833

Trust: 0.6

db:AUSCERTid:ESB-2022.0755

Trust: 0.6

db:AUSCERTid:ESB-2022.0536

Trust: 0.6

db:AUSCERTid:ESB-2022.6332

Trust: 0.6

db:AUSCERTid:ESB-2022.3692

Trust: 0.6

db:AUSCERTid:ESB-2022.0835

Trust: 0.6

db:AUSCERTid:ESB-2022.0739

Trust: 0.6

db:AUSCERTid:ESB-2022.3019

Trust: 0.6

db:LENOVOid:LEN-77639

Trust: 0.6

db:CNNVDid:CNNVD-202202-663

Trust: 0.6

db:VULHUBid:VHN-371714

Trust: 0.1

db:VULMONid:CVE-2021-0145

Trust: 0.1

sources: VULHUB: VHN-371714 // VULMON: CVE-2021-0145 // JVNDB: JVNDB-2022-005263 // PACKETSTORM: 167553 // PACKETSTORM: 167862 // CNNVD: CNNVD-202202-663 // NVD: CVE-2021-0145

REFERENCES

url:https://security.netapp.com/advisory/ntap-20220210-0009/

Trust: 1.8

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-0145

Trust: 1.0

url:https://jvn.jp/vu/jvnvu99045838/

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2021-0145

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2022.3019

Trust: 0.6

url:https://packetstormsecurity.com/files/167862/ubuntu-security-notice-usn-5535-1.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-processor-information-disclosure-via-shared-resources-37517

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022021005

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6332

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-77639

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0739

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3692

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0835

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062041

Trust: 0.6

url:https://packetstormsecurity.com/files/167553/ubuntu-security-notice-usn-5486-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0536

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0833

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0755

Trust: 0.6

url:https://ubuntu.com/security/notices/usn-5486-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21166

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33120

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33117

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-0146

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21151

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-0127

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21127

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/665.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.21.10.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.22.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.20.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5535-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21125

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21123

Trust: 0.1

sources: VULHUB: VHN-371714 // VULMON: CVE-2021-0145 // JVNDB: JVNDB-2022-005263 // PACKETSTORM: 167553 // PACKETSTORM: 167862 // CNNVD: CNNVD-202202-663 // NVD: CVE-2021-0145

CREDITS

Ubuntu

Trust: 0.2

sources: PACKETSTORM: 167553 // PACKETSTORM: 167862

SOURCES

db:VULHUBid:VHN-371714
db:VULMONid:CVE-2021-0145
db:JVNDBid:JVNDB-2022-005263
db:PACKETSTORMid:167553
db:PACKETSTORMid:167862
db:CNNVDid:CNNVD-202202-663
db:NVDid:CVE-2021-0145

LAST UPDATE DATE

2024-08-14T13:08:21.016000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-371714date:2022-02-15T00:00:00
db:VULMONid:CVE-2021-0145date:2022-02-15T00:00:00
db:JVNDBid:JVNDB-2022-005263date:2023-05-25T04:42:00
db:CNNVDid:CNNVD-202202-663date:2022-12-07T00:00:00
db:NVDid:CVE-2021-0145date:2022-02-15T21:20:31.007

SOURCES RELEASE DATE

db:VULHUBid:VHN-371714date:2022-02-09T00:00:00
db:VULMONid:CVE-2021-0145date:2022-02-09T00:00:00
db:JVNDBid:JVNDB-2022-005263date:2023-05-25T00:00:00
db:PACKETSTORMid:167553date:2022-06-20T16:27:17
db:PACKETSTORMid:167862date:2022-07-28T14:56:22
db:CNNVDid:CNNVD-202202-663date:2022-02-08T00:00:00
db:NVDid:CVE-2021-0145date:2022-02-09T23:15:13.857