CVE-2021-3679

Updated: 2025-08-20 00:40:29.500106

Description:

A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x LOW 2.1
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2023-11-21 04:12:27 - Exploitation is local-only and requires CAP_SYS_ADMIN to manipulate the kernel tracing ring buffer...
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Not Vulnerable 2022-01-01 14:14:04
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Released CLSA-2024:1720468480 2024-07-23 17:33:40
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2022:1651145959 2022-04-28 16:00:01
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Already Fixed 2025-10-24 07:18:25
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2022-01-27 11:20:10 Ignored due to low severity
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Not Vulnerable 2022-11-30 10:09:51
RHEL 7 ELS kernel 3.10.0 5.5 MEDIUM Released CLSA-2025:1750353839 2025-06-20 00:28:16
Ubuntu 16.04 ELS linux-hwe 4.15.0 5.5 MEDIUM Ignored 2022-09-28 08:02:38 Ignored due to low severity
Ubuntu 16.04 ELS linux 4.4.0 5.5 MEDIUM Released CLSA-2022:1667414297 2022-11-02 17:09:11 Ignored due to low severity
Total: 11