vulnerability
Amazon Linux AMI 2: CVE-2021-4002: Security patch for kernel, kernel-livepatch-4.14.246-187.474, kernel-livepatch-4.14.248-189.473, kernel-livepatch-4.14.252-195.481, kernel-livepatch-4.14.252-195.483, kernel-livepatch-5.10.62-55.141, kernel-livepatch-5.10.68-62.173, kernel-livepatch-5.10.75-79.358 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:N/C:P/I:P/A:N) | Mar 3, 2022 | Jul 4, 2022 | Apr 30, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
Mar 3, 2022
Added
Jul 4, 2022
Modified
Apr 30, 2025
Description
A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
Solutions
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-246-187-474amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-246-187-474-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-248-189-473amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-248-189-473-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-252-195-481amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-252-195-481-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-252-195-483amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-252-195-483-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-256-197-484amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-62-55-141amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-62-55-141-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-68-62-173amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-68-62-173-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-75-79-358amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-75-79-358-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-82-83-359amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.