← Back
UBUNTU-CVE-2021-39713
Product: AndroidVersions: Android kernelAndroid ID: A-173788806References: Upstream kernel
AI summary snake-internal / snake-template-v1
A weakness called UBUNTU-CVE-2021-39713 was discovered in the affected product.
Severity is Info. Low severity or not yet rated.
What you should do: update the affected software to the latest version. If unsure, ask your IT team or search the vendor's site for "the product UBUNTU-CVE-2021-39713".
UBUNTU-CVE-2021-39713 (the affected product). Severity: Info.
Response plan:
1. Check the vendor advisory for affected versions and the patched release.
2. If a vulnerable version is running in production, schedule maintenance (urgency from KEV/CVSS).
3. If no patch yet, mitigate via WAF rule, disabling the affected feature, etc.
4. Monitor logs / SIEM for known IOC and PoC signatures of this CVE.
PoCs and fix commits: see the 'References' section, MITRE, and NVD.
❓ What is the problem
A weakness (UBUNTU-CVE-2021-39713) in the affected product. A serious software flaw has been identified.
📍 Affected scope
Target versions of the affected product (see vendor advisory). If running in production, identify exposure immediately.
🔥 Severity
Severity: Info. Low severity or not yet rated.
🔧 How to fix
Update to the patched release as listed in the vendor advisory.
🛡️ Workaround
If a patch is not yet available, consider disabling the affected feature, applying WAF rules, blocking via network ACLs, or isolating the vulnerable version.
🔍 Detection
Check version information, scan dependencies via SBOM, and monitor SIEM for IOC and PoC signatures related to this CVE.
Affected packages
Ubuntu:Pro:14.04:LTS
linux
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.13.0-190.241"}]}]
Ubuntu:Pro:14.04:LTS
linux-aws
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1104.109"}]}]
Ubuntu:Pro:14.04:LTS
linux-lts-xenial
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-224.257~14.04.1"}]}]
Ubuntu:16.04:LTS
linux-azure
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1013.13~16.04.2"}]}]
Ubuntu:16.04:LTS
linux-gcp
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1014.14~16.04.1"}]}]
Ubuntu:16.04:LTS
linux-hwe
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-24.26~16.04.1"}]}]
Ubuntu:Pro:16.04:LTS
linux
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-224.257"}]}]
Ubuntu:Pro:16.04:LTS
linux-aws
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1140.154"}]}]
Ubuntu:16.04:LTS
linux-hwe-edge
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:Pro:16.04:LTS
linux-kvm
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1105.114"}]}]
Ubuntu:Pro:FIPS:16.04:LTS
linux-fips
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-snapdragon
[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1053.57"}]}]
Ubuntu:18.04:LTS
linux-aws-5.0
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-aws-5.3
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-azure
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-azure-5.3
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-azure-edge
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-gcp
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-gcp-5.3
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-gke-4.15
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-hwe
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-oem
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-oracle-5.0
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:18.04:LTS
linux-oracle-5.3
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-aws-5.11
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-aws-5.8
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-azure-5.11
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-azure-5.8
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-gcp-5.11
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-gcp-5.8
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-hwe-5.11
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-hwe-5.8
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-intel-5.13
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-oem-5.10
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-oem-5.13
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-oem-5.6
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-oracle-5.11
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-oracle-5.8
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-raspi2
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-riscv
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-riscv-5.11
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:20.04:LTS
linux-riscv-5.8
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:22.04:LTS
linux-intel-iot-realtime
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:22.04:LTS
linux-realtime
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:24.04:LTS
linux-raspi-realtime
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
Ubuntu:26.04
linux-nvidia
[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]
References
- advisory https://ubuntu.com/security/notices/USN-5413-1
- advisory https://ubuntu.com/security/notices/USN-5484-1
- report https://ubuntu.com/security/CVE-2021-39713
- report https://source.android.com/security/bulletin/pixel/2022-03-01
- report https://android.googlesource.com/kernel/common/+/e368fdb61d8e7
- report https://android.googlesource.com/kernel/common/+/9d7e82cec35c0
- report https://android.googlesource.com/kernel/common/+/3a7d0d07a3867
- report https://android.googlesource.com/kernel/common/+/86bd446b5cebd
- report https://android.googlesource.com/kernel/common/+/6f99528e97977
- report https://syzkaller.appspot.com/bug?id=d7e411c5472dd5da33d8cc921ccadc747743a568
- report https://www.cve.org/CVERecord?id=CVE-2021-39713