5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.3%
A memory leak flaw was found in the Linux kernel’s ccp_run_aes_gcm_cmd()
function that allows an attacker to cause a denial of service. The
vulnerability is similar to the older CVE-2019-18808. The highest threat
from this vulnerability is to system availability.
Author | Note |
---|---|
sbeattie | Red Hat asserts that the patch for CVE-2021-3744 contains the fix for CVE-2021-3764 as well. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-91.102 | UNKNOWN |
ubuntu | 21.04 | noarch | linux | < 5.11.0-41.45 | UNKNOWN |
ubuntu | 21.10 | noarch | linux | < 5.13.0-22.22 | UNKNOWN |
ubuntu | 18.04 | noarch | linux | < 4.15.0-163.171 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-aws | < 5.13.0-1007.8 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1116.123 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1060.63 | UNKNOWN |
ubuntu | 21.04 | noarch | linux-aws | < 5.11.0-1022.23 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.11 | < 5.11.0-1022.23~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1060.63~18.04.1 | UNKNOWN |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
launchpad.net/bugs/cve/CVE-2021-3764
nvd.nist.gov/vuln/detail/CVE-2021-3764
security-tracker.debian.org/tracker/CVE-2021-3764
ubuntu.com/security/notices/USN-5139-1
ubuntu.com/security/notices/USN-5140-1
ubuntu.com/security/notices/USN-5161-1
ubuntu.com/security/notices/USN-5162-1
ubuntu.com/security/notices/USN-5163-1
ubuntu.com/security/notices/USN-5164-1
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.3%