5.5
CVSSv3

CVE-2021-3679

Published: 05/08/2021 Updated: 27/10/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A lack of CPU resource in the Linux kernel tracing module functionality in versions before 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 5.14

linux linux kernel

redhat enterprise linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2020-3702 A flaw was found in the driver for Atheros IEEE 80211n family of chipsets (ath9k) allowing information disclosure CVE-2020-16119 Hadar Manor reported a use-after-free in the D ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
A flaw was found in the Linux kernel When reusing a socket with an attached dccps_hc_tx_ccid as a listener, the socket will be used after being released leading to denial of service (DoS) or a potential code execution The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (CVE-2020-1611 ...
A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service ...
A flaw was found in the Linux kernel, where a BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack This issue occurs when the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack The highest threat from this vulnerability is to confidentialit ...
A flaw was found in the Linux kernel This flaw allows attackers to cause a denial of service (soft lockup) by triggering the destruction of a large SEV VM, which requires unregistering many encrypted regions The highest threat from this vulnerability is to system availability (CVE-2020-36311) A flaw was found in the Linux kernel's BPF subsystem, ...
A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service ...