
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-39713 affects the Android kernel, specifically the network scheduling subsystem. The vulnerability was discovered by the syzbot tool and involves a race condition that could lead to a use-after-free vulnerability. This security issue was disclosed in March 2022 and affects various Linux-based systems including Android devices and multiple Linux distributions (Ubuntu Security, Debian Security).
The vulnerability is classified as a race condition in the network scheduling subsystem of the Linux kernel, which leads to a use-after-free condition. It has been assigned a CVSS v3.1 base score of 7.0 (High), with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability is tracked under CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization) (NVD).
The vulnerability can allow a local attacker to cause a denial of service through system crashes or memory corruption. In more severe cases, it could potentially lead to arbitrary code execution with elevated privileges (Ubuntu Security).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has provided fixes across various kernel versions, including ESM updates for older releases. Debian has addressed the issue in version 4.9.320-2 for Debian 9 (Stretch). Users are advised to update their systems to the patched versions (Debian Security, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."