vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-3573): Linux kernel (OEM) vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Jul 9, 2021 | Jul 21, 2021 | Aug 18, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 9, 2021
Added
Jul 21, 2021
Modified
Aug 18, 2025
Description
A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1079-oracleubuntu-upgrade-linux-image-4-15-0-1094-raspi2ubuntu-upgrade-linux-image-4-15-0-1098-kvmubuntu-upgrade-linux-image-4-15-0-1107-gcpubuntu-upgrade-linux-image-4-15-0-1110-awsubuntu-upgrade-linux-image-4-15-0-1111-snapdragonubuntu-upgrade-linux-image-4-15-0-1122-azureubuntu-upgrade-linux-image-4-15-0-154-genericubuntu-upgrade-linux-image-4-15-0-154-generic-lpaeubuntu-upgrade-linux-image-4-15-0-154-lowlatencyubuntu-upgrade-linux-image-4-4-0-1102-awsubuntu-upgrade-linux-image-4-4-0-1103-kvmubuntu-upgrade-linux-image-4-4-0-1138-awsubuntu-upgrade-linux-image-4-4-0-222-genericubuntu-upgrade-linux-image-4-4-0-222-lowlatencyubuntu-upgrade-linux-image-5-10-0-1038-oemubuntu-upgrade-linux-image-5-11-0-1013-azureubuntu-upgrade-linux-image-5-11-0-1014-kvmubuntu-upgrade-linux-image-5-11-0-1016-awsubuntu-upgrade-linux-image-5-11-0-1016-oracleubuntu-upgrade-linux-image-5-11-0-1016-raspiubuntu-upgrade-linux-image-5-11-0-1016-raspi-nolpaeubuntu-upgrade-linux-image-5-11-0-1017-gcpubuntu-upgrade-linux-image-5-11-0-27-genericubuntu-upgrade-linux-image-5-11-0-27-generic-64kubuntu-upgrade-linux-image-5-11-0-27-generic-lpaeubuntu-upgrade-linux-image-5-11-0-27-lowlatencyubuntu-upgrade-linux-image-5-11-0-31-genericubuntu-upgrade-linux-image-5-11-0-31-generic-64kubuntu-upgrade-linux-image-5-11-0-31-generic-lpaeubuntu-upgrade-linux-image-5-11-0-31-lowlatencyubuntu-upgrade-linux-image-5-4-0-1022-gkeopubuntu-upgrade-linux-image-5-4-0-1042-raspiubuntu-upgrade-linux-image-5-4-0-1045-kvmubuntu-upgrade-linux-image-5-4-0-1051-gcpubuntu-upgrade-linux-image-5-4-0-1051-gkeubuntu-upgrade-linux-image-5-4-0-1053-oracleubuntu-upgrade-linux-image-5-4-0-1055-awsubuntu-upgrade-linux-image-5-4-0-1056-azureubuntu-upgrade-linux-image-5-4-0-81-genericubuntu-upgrade-linux-image-5-4-0-81-generic-lpaeubuntu-upgrade-linux-image-5-4-0-81-lowlatencyubuntu-upgrade-linux-image-5-8-0-1038-oracleubuntu-upgrade-linux-image-5-8-0-1039-gcpubuntu-upgrade-linux-image-5-8-0-1040-azureubuntu-upgrade-linux-image-5-8-0-1042-awsubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.