{"id":"CVE-2021-3714","details":"A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged.","modified":"2026-03-14T14:57:56.329369Z","published":"2022-08-23T16:15:09.600Z","related":["CGA-3vwh-35gj-mfqv"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2021-3714"},{"type":"ADVISORY","url":"https://arxiv.org/abs/2111.08553"},{"type":"ADVISORY","url":"https://arxiv.org/pdf/2111.08553.pdf"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1931327"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3714.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}