MEDIUM · 5.5

CVE-2021-3669

A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.

Vulnerability Description

A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.

CVSS Score

5.5

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
LinuxLinux KernelAll versions
IbmSpectrum Copy Data Management>= 2.2.0.0, <= 2.2.15.0
IbmSpectrum Protect Plus>= 10.1.0, <= 10.1.10.2
DebianDebian Linux10.0
FedoraprojectFedora34
RedhatBuild Of Quarkus>= 2.0, < 2.7
RedhatDeveloper Tools1.0
RedhatEnterprise Linux6.0
RedhatEnterprise Linux Aus8.6
RedhatEnterprise Linux For Ibm Z Systems8.0
RedhatEnterprise Linux For Ibm Z Systems Eus8.6
RedhatEnterprise Linux For Power Little Endian8.0
RedhatEnterprise Linux For Power Little Endian Eus8.6
RedhatEnterprise Linux For Real Time8
RedhatEnterprise Linux For Real Time For Nfv8
RedhatEnterprise Linux For Real Time For Nfv Tus8.6
RedhatEnterprise Linux For Real Time Tus8.6
RedhatEnterprise Linux Server Aus8.6
RedhatEnterprise Linux Server For Power Little Endian Update Services For Sap Solutions8.6
RedhatEnterprise Linux Server Tus8.6

Related Weaknesses (CWE)

References

FAQ

What is CVE-2021-3669?

CVE-2021-3669 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.

How severe is CVE-2021-3669?

CVE-2021-3669 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2021-3669?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Ibm Spectrum Copy Data Management, Ibm Spectrum Protect Plus, Debian Debian Linux, Fedoraproject Fedora.