A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-3669 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1980619 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1986473 | Issue Tracking Permissions Required |
https://security-tracker.debian.org/tracker/CVE-2021-3669 | Issue Tracking Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2021-3669 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1980619 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1986473 | Issue Tracking Permissions Required |
https://security-tracker.debian.org/tracker/CVE-2021-3669 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2021-3669 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1980619 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1986473 - Issue Tracking, Permissions Required | |
References | () https://security-tracker.debian.org/tracker/CVE-2021-3669 - Issue Tracking, Third Party Advisory |
07 Jul 2023, 19:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:* cpe:2.3:a:ibm:spectrum_protect_plus:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:a:ibm:spectrum_copy_data_management:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:build_of_quarkus:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-770 | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1986473 - Issue Tracking, Permissions Required | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2021-3669 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://security-tracker.debian.org/tracker/CVE-2021-3669 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1980619 - Issue Tracking, Third Party Advisory |
26 Aug 2022, 17:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-26 16:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3669
Mitre link : CVE-2021-3669
CVE.ORG link : CVE-2021-3669
JSON object : View
Products Affected
redhat
- enterprise_linux_for_power_little_endian
- developer_tools
- enterprise_linux_for_ibm_z_systems
- openshift_container_platform
- build_of_quarkus
- enterprise_linux_aus
- enterprise_linux_for_real_time_for_nfv_tus
- enterprise_linux_server_aus
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_tus
- virtualization_host
- enterprise_linux
- enterprise_linux_for_real_time_for_nfv
- enterprise_linux_for_real_time_tus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_real_time
- enterprise_linux_eus
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- codeready_linux_builder
ibm
- spectrum_copy_data_management
- spectrum_protect_plus
debian
- debian_linux
linux
- linux_kernel
fedoraproject
- fedora