Description
A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3244-1 | linux-5.10 security update |
EUVD |
EUVD-2021-27032 | A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability. |
Ubuntu USN |
USN-5115-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5117-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5120-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5135-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-5136-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5137-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5137-2 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:09:08.717Z
Reserved: 2021-09-01T00:00:00.000Z
Link: CVE-2021-3759
No data.
Status : Modified
Published: 2022-08-23T16:15:09.737
Modified: 2024-11-21T06:22:21.397
Link: CVE-2021-3759
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN