A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
The product does not properly control the allocation and maintenance of a limited resource.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1989165 | issue tracking third party advisory patch |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a | mailing list patch vendor advisory |
https://www.debian.org/security/2021/dsa-4978 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | third party advisory mailing list |