Unrated severityNVD Advisory· Published Mar 16, 2022· Updated Aug 4, 2024
CVE-2021-39685
CVE-2021-39685
Description
In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
Affected products
43- osv-coords43 versionspkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-preempt&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.3pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3
< 5.3.18-150300.59.49.1+ 42 more
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.38.40.4
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1.150300.18.31.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.38.40.4
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.38.40.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.38.40.4
- (no CPE)range: < 5.3.18-150300.59.49.1.150300.18.31.1
- (no CPE)range: < 5.3.18-150300.59.49.1.150300.18.31.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 1-150300.7.3.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.76.1
- (no CPE)range: < 5.3.18-150300.76.1
- (no CPE)range: < 5.3.18-150300.76.1
- (no CPE)range: < 5.3.18-150300.38.40.4
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.76.1
- (no CPE)range: < 5.3.18-150300.38.40.1
- (no CPE)range: < 5.3.18-150300.59.49.1
- (no CPE)range: < 5.3.18-150300.76.1
- (no CPE)range: < 5.3.18-150300.59.49.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- source.android.com/security/bulletin/2022-03-01mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.