vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-3612): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Jul 9, 2021 | Sep 9, 2021 | Mar 22, 2023 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jul 9, 2021
Added
Sep 9, 2021
Modified
Mar 22, 2023
Description
An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Solution(s)
ubuntu-upgrade-linux-image-4-15-0-1027-dell300xubuntu-upgrade-linux-image-4-15-0-1080-oracleubuntu-upgrade-linux-image-4-15-0-1095-raspi2ubuntu-upgrade-linux-image-4-15-0-1099-kvmubuntu-upgrade-linux-image-4-15-0-1108-gcpubuntu-upgrade-linux-image-4-15-0-1111-awsubuntu-upgrade-linux-image-4-15-0-1112-snapdragonubuntu-upgrade-linux-image-4-15-0-1123-azureubuntu-upgrade-linux-image-4-15-0-156-genericubuntu-upgrade-linux-image-4-15-0-156-generic-lpaeubuntu-upgrade-linux-image-4-15-0-156-lowlatencyubuntu-upgrade-linux-image-4-4-0-1099-awsubuntu-upgrade-linux-image-4-4-0-1100-kvmubuntu-upgrade-linux-image-4-4-0-1102-awsubuntu-upgrade-linux-image-4-4-0-1103-kvmubuntu-upgrade-linux-image-4-4-0-1135-awsubuntu-upgrade-linux-image-4-4-0-1138-awsubuntu-upgrade-linux-image-4-4-0-219-genericubuntu-upgrade-linux-image-4-4-0-219-lowlatencyubuntu-upgrade-linux-image-4-4-0-222-genericubuntu-upgrade-linux-image-4-4-0-222-lowlatencyubuntu-upgrade-linux-image-5-10-0-1049-oemubuntu-upgrade-linux-image-5-11-0-1015-azureubuntu-upgrade-linux-image-5-11-0-1015-kvmubuntu-upgrade-linux-image-5-11-0-1017-awsubuntu-upgrade-linux-image-5-11-0-1017-oracleubuntu-upgrade-linux-image-5-11-0-1017-raspiubuntu-upgrade-linux-image-5-11-0-1017-raspi-nolpaeubuntu-upgrade-linux-image-5-11-0-1018-gcpubuntu-upgrade-linux-image-5-11-0-34-genericubuntu-upgrade-linux-image-5-11-0-34-generic-64kubuntu-upgrade-linux-image-5-11-0-34-generic-lpaeubuntu-upgrade-linux-image-5-11-0-34-lowlatencyubuntu-upgrade-linux-image-5-13-0-1014-oemubuntu-upgrade-linux-image-5-4-0-1023-gkeopubuntu-upgrade-linux-image-5-4-0-1043-raspiubuntu-upgrade-linux-image-5-4-0-1046-kvmubuntu-upgrade-linux-image-5-4-0-1052-gcpubuntu-upgrade-linux-image-5-4-0-1052-gkeubuntu-upgrade-linux-image-5-4-0-1054-oracleubuntu-upgrade-linux-image-5-4-0-1056-awsubuntu-upgrade-linux-image-5-4-0-1058-azureubuntu-upgrade-linux-image-5-4-0-84-genericubuntu-upgrade-linux-image-5-4-0-84-generic-lpaeubuntu-upgrade-linux-image-5-4-0-84-lowlatencyubuntu-upgrade-linux-image-5-8-0-1043-azureubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
- CVE-2021-3612
- https://attackerkb.com/topics/CVE-2021-3612
- NVD-CVE-2021-3612
- UBUNTU-USN-4465-1
- UBUNTU-USN-4483-1
- UBUNTU-USN-4485-1
- UBUNTU-USN-4945-1
- UBUNTU-USN-4945-2
- UBUNTU-USN-4946-1
- UBUNTU-USN-4947-1
- UBUNTU-USN-4948-1
- UBUNTU-USN-4949-1
- UBUNTU-USN-4977-1
- UBUNTU-USN-4979-1
- UBUNTU-USN-4982-1
- UBUNTU-USN-4984-1
- UBUNTU-USN-4989-1
- UBUNTU-USN-4989-2
- UBUNTU-USN-4997-1
- UBUNTU-USN-4997-2
- UBUNTU-USN-4999-1
- UBUNTU-USN-5000-1
- UBUNTU-USN-5000-2
- UBUNTU-USN-5001-1
- UBUNTU-USN-5015-1
- UBUNTU-USN-5016-1
- UBUNTU-USN-5017-1
- UBUNTU-USN-5018-1
- UBUNTU-USN-5044-1
- UBUNTU-USN-5045-1
- UBUNTU-USN-5046-1
- UBUNTU-USN-5050-1
- UBUNTU-USN-5070-1
- UBUNTU-USN-5071-1
- UBUNTU-USN-5071-2
- UBUNTU-USN-5071-3
- UBUNTU-USN-5073-1
- UBUNTU-USN-5073-2
- UBUNTU-USN-5073-3
- UBUNTU-USN-5091-1
- UBUNTU-USN-5091-2
- UBUNTU-USN-5092-1
- UBUNTU-USN-5092-2
- UBUNTU-USN-5094-1
- UBUNTU-USN-5094-2
- UBUNTU-USN-5096-1
- UBUNTU-USN-5106-1
- UBUNTU-USN-5113-1
- UBUNTU-USN-5114-1
- UBUNTU-USN-5115-1
- UBUNTU-USN-5116-1
- UBUNTU-USN-5116-2
- UBUNTU-USN-5120-1
- UBUNTU-USN-5136-1
- UBUNTU-USN-5137-1
- UBUNTU-USN-5137-2
- UBUNTU-USN-5139-1
- UBUNTU-USN-5165-1
- UBUNTU-USN-5208-1
- UBUNTU-USN-5209-1
- UBUNTU-USN-5210-1
- UBUNTU-USN-5218-1
- UBUNTU-USN-5278-1
- UBUNTU-USN-5299-1
- UBUNTU-USN-5302-1
- UBUNTU-USN-5337-1
- UBUNTU-USN-5338-1
- UBUNTU-USN-5339-1
- UBUNTU-USN-5343-1
- UBUNTU-USN-5362-1
- UBUNTU-USN-5368-1
- UBUNTU-USN-5377-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.