First published: Thu Jul 15 2021(Updated: )
A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
redhat/Linux kernel | <5.15 | 5.15 |
Linux Kernel | ||
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 6.12.27-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3759 has a high severity rating due to its potential to cause denial of service through resource starvation.
To fix CVE-2021-3759, you should upgrade to the specified patched versions of the Linux kernel, such as kernel-rt 0:4.18.0-372.9.1.rt7.166.el8 or 5.10.223-1 and newer.
CVE-2021-3759 affects various Linux distributions including Red Hat Enterprise Linux and Debian.
CVE-2021-3759 cannot be exploited remotely as it requires local user access to the system.
CVE-2021-3759 impacts the IPC functionality within the memory control group (memcg) subsystem of the Linux kernel.