A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-3669 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1980619 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1986473 | Issue Tracking Permissions Required |
https://security-tracker.debian.org/tracker/CVE-2021-3669 | Issue Tracking Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2021-3669 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1980619 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1986473 | Issue Tracking Permissions Required |
https://security-tracker.debian.org/tracker/CVE-2021-3669 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2021-3669 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1980619 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1986473 - Issue Tracking, Permissions Required | |
References | () https://security-tracker.debian.org/tracker/CVE-2021-3669 - Issue Tracking, Third Party Advisory |
07 Jul 2023, 19:16
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1986473 - Issue Tracking, Permissions Required | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2021-3669 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://security-tracker.debian.org/tracker/CVE-2021-3669 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1980619 - Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:* cpe:2.3:a:ibm:spectrum_protect_plus:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:a:ibm:spectrum_copy_data_management:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:build_of_quarkus:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-770 |
26 Aug 2022, 17:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-26 16:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3669
Mitre link : CVE-2021-3669
CVE.ORG link : CVE-2021-3669
JSON object : View
Products Affected
redhat
- enterprise_linux
- codeready_linux_builder
- enterprise_linux_for_real_time
- build_of_quarkus
- enterprise_linux_for_real_time_tus
- enterprise_linux_server_tus
- enterprise_linux_eus
- virtualization_host
- developer_tools
- openshift_container_platform
- enterprise_linux_for_real_time_for_nfv_tus
- enterprise_linux_aus
- enterprise_linux_for_real_time_for_nfv
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_aus
- enterprise_linux_for_power_little_endian
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
ibm
- spectrum_protect_plus
- spectrum_copy_data_management
fedoraproject
- fedora
linux
- linux_kernel
debian
- debian_linux