CVE-2021-3679

Name
CVE-2021-3679
Description
A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a
MISC https://bugzilla.redhat.com/show_bug.cgi?id=1989165
Third Party Advisory https://www.debian.org/security/2021/dsa-4978
Third Party Advisory https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
Mailing List https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* linux_kernel >= None < 5.14

Vulnerable and fixed packages

Source package Branch Version Maintainer Status