A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3244-1 | linux-5.10 security update |
EUVD |
EUVD-2021-27032 | A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability. |
Ubuntu USN |
USN-5115-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5117-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5120-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5135-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-5136-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5137-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5137-2 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:09:08.717Z
Reserved: 2021-09-01T00:00:00
Link: CVE-2021-3759
No data.
Status : Modified
Published: 2022-08-23T16:15:09.737
Modified: 2024-11-21T06:22:21.397
Link: CVE-2021-3759
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN