{"id":"CVE-2021-3612","details":"An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.","modified":"2026-03-15T22:41:07.573951Z","published":"2021-07-09T11:15:09.457Z","related":["ALSA-2022:1988","SUSE-SU-2021:2407-1","SUSE-SU-2021:2408-1","SUSE-SU-2021:2416-1","SUSE-SU-2021:2438-1","SUSE-SU-2021:2599-1","SUSE-SU-2021:2599-2","SUSE-SU-2021:2643-1","SUSE-SU-2021:2645-1","SUSE-SU-2021:2687-1","openSUSE-SU-2021:1076-1","openSUSE-SU-2021:2645-1","openSUSE-SU-2021:2687-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/"},{"type":"WEB","url":"https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82%40gmail.com/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210805-0005/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1974079"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3612.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"22.1.3"}]},{"events":[{"introduced":"0"},{"last_affected":"22.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"22.2.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}