vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-39685): Linux kernel (OEM) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Feb 9, 2022 | Feb 9, 2022 | Mar 22, 2023 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Feb 9, 2022
Added
Feb 9, 2022
Modified
Mar 22, 2023
Description
In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
Solution(s)
ubuntu-upgrade-linux-image-4-15-0-1035-dell300xubuntu-upgrade-linux-image-4-15-0-1087-oracleubuntu-upgrade-linux-image-4-15-0-1103-raspi2ubuntu-upgrade-linux-image-4-15-0-1107-kvmubuntu-upgrade-linux-image-4-15-0-1116-gcpubuntu-upgrade-linux-image-4-15-0-1120-snapdragonubuntu-upgrade-linux-image-4-15-0-1131-azureubuntu-upgrade-linux-image-4-15-0-169-genericubuntu-upgrade-linux-image-4-15-0-169-generic-lpaeubuntu-upgrade-linux-image-4-15-0-169-lowlatencyubuntu-upgrade-linux-image-4-4-0-1109-awsubuntu-upgrade-linux-image-4-4-0-1110-kvmubuntu-upgrade-linux-image-4-4-0-229-genericubuntu-upgrade-linux-image-4-4-0-229-lowlatencyubuntu-upgrade-linux-image-5-13-0-1018-kvmubuntu-upgrade-linux-image-5-13-0-1019-awsubuntu-upgrade-linux-image-5-13-0-1021-azureubuntu-upgrade-linux-image-5-13-0-1021-gcpubuntu-upgrade-linux-image-5-13-0-1022-raspiubuntu-upgrade-linux-image-5-13-0-1022-raspi-nolpaeubuntu-upgrade-linux-image-5-13-0-1023-oracleubuntu-upgrade-linux-image-5-13-0-1025-oracleubuntu-upgrade-linux-image-5-13-0-37-genericubuntu-upgrade-linux-image-5-13-0-37-generic-64kubuntu-upgrade-linux-image-5-13-0-37-generic-lpaeubuntu-upgrade-linux-image-5-13-0-37-lowlatencyubuntu-upgrade-linux-image-5-14-0-1022-oemubuntu-upgrade-linux-image-5-4-0-100-genericubuntu-upgrade-linux-image-5-4-0-100-generic-lpaeubuntu-upgrade-linux-image-5-4-0-100-lowlatencyubuntu-upgrade-linux-image-5-4-0-1015-ibmubuntu-upgrade-linux-image-5-4-0-1028-bluefieldubuntu-upgrade-linux-image-5-4-0-1034-gkeopubuntu-upgrade-linux-image-5-4-0-1053-raspiubuntu-upgrade-linux-image-5-4-0-1056-kvmubuntu-upgrade-linux-image-5-4-0-1063-gkeubuntu-upgrade-linux-image-5-4-0-1064-oracleubuntu-upgrade-linux-image-5-4-0-1065-gcpubuntu-upgrade-linux-image-5-4-0-1066-awsubuntu-upgrade-linux-image-5-4-0-1070-azureubuntu-upgrade-linux-image-5-4-0-1070-azure-fdeubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
- CVE-2021-39685
- https://attackerkb.com/topics/CVE-2021-39685
- NVD-CVE-2021-39685
- UBUNTU-USN-5278-1
- UBUNTU-USN-5294-1
- UBUNTU-USN-5294-2
- UBUNTU-USN-5297-1
- UBUNTU-USN-5298-1
- UBUNTU-USN-5302-1
- UBUNTU-USN-5337-1
- UBUNTU-USN-5338-1
- UBUNTU-USN-5339-1
- UBUNTU-USN-5343-1
- UBUNTU-USN-5346-1
- UBUNTU-USN-5353-1
- UBUNTU-USN-5357-1
- UBUNTU-USN-5357-2
- UBUNTU-USN-5358-1
- UBUNTU-USN-5358-2
- UBUNTU-USN-5362-1
- UBUNTU-USN-5368-1
- UBUNTU-USN-5377-1
- UBUNTU-USN-5385-1
- UBUNTU-USN-5467-1
- UBUNTU-USN-5505-1
- UBUNTU-USN-5513-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.