Bug 1986473 (CVE-2021-3669)
Summary: | CVE-2021-3669 kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, bhu, blc, brdeoliv, bskeggs, carnil, chwhite, crwood, dhoward, dvlasenk, fhrbata, fpacheco, hdegoede, hkrzesin, jarod, jarodwilson, jeremy, jforbes, jlelli, jonathan, josef, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, masami256, mchehab, mlangsdo, nmurray, ptalbert, qzhao, rvrbovsk, security-response-team, steved, walters, williams, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-05-11 08:15:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1987128, 1987129, 1987130, 1988923 | ||
Bug Blocks: | 1985504 |
Description
Guilherme de Almeida Suckevicz
2021-07-27 16:25:21 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1988923] Has this issue been reported upstream? Is there any reference to it? Not reported upstream, patches are being worked on. It is not considered high impact because of the requirements and need to have massive amount of shm (usually well above ulimits) Product bug https://bugzilla.redhat.com/show_bug.cgi?id=1980619 In reply to comment #9: > Has this issue been reported upstream? Is there any reference to it? Please see comment#10. Thanks. This was fixed for Fedora with the 5.15.x kernel rebases. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1975 https://access.redhat.com/errata/RHSA-2022:1975 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1988 https://access.redhat.com/errata/RHSA-2022:1988 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3669 |