CVE-2021-20265

Source
https://cve.org/CVERecord?id=CVE-2021-20265
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20265.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-20265
Downstream
Related
Published
2021-03-10T16:15:16.610Z
Modified
2026-05-05T12:44:24.172923Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in the way memory resources were freed in the unixstreamrecvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.

Database specific
{
    "unresolved_ranges": [
        {
            "cpe": "cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*",
            "extracted_events": [
                {
                    "introduced": "7.4.0"
                },
                {
                    "last_affected": "7.7.1"
                }
            ],
            "source": "CPE_FIELD"
        }
    ]
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
fa0dc04df259ba2df3ce1920e9690c7842f8fa4b
Database specific
{
    "source": "REFERENCES"
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20265.json"