A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3244-1 linux-5.10 security update
EUVD EUVD EUVD-2021-27032 A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
Ubuntu USN Ubuntu USN USN-5115-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5117-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5120-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-5135-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-5136-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5137-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5137-2 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:09:08.717Z

Reserved: 2021-09-01T00:00:00

Link: CVE-2021-3759

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-23T16:15:09.737

Modified: 2024-11-21T06:22:21.397

Link: CVE-2021-3759

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-07-15T09:00:00Z

Links: CVE-2021-3759 - Bugzilla

cve-icon OpenCVE Enrichment

No data.