vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-4002): Linux kernel (OEM) vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:N/C:P/I:P/A:N) | Jan 6, 2022 | Jan 6, 2022 | Mar 27, 2026 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
Jan 6, 2022
Added
Jan 6, 2022
Modified
Mar 27, 2026
Description
A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
Solutions
ubuntu-upgrade-linux-image-3-13-0-189-genericubuntu-upgrade-linux-image-3-13-0-189-generic-lpaeubuntu-upgrade-linux-image-3-13-0-189-lowlatencyubuntu-upgrade-linux-image-4-15-0-1033-dell300xubuntu-upgrade-linux-image-4-15-0-1085-oracleubuntu-upgrade-linux-image-4-15-0-1101-raspi2ubuntu-upgrade-linux-image-4-15-0-1105-kvmubuntu-upgrade-linux-image-4-15-0-1114-gcpubuntu-upgrade-linux-image-4-15-0-1118-awsubuntu-upgrade-linux-image-4-15-0-1118-snapdragonubuntu-upgrade-linux-image-4-15-0-1129-azureubuntu-upgrade-linux-image-4-15-0-166-genericubuntu-upgrade-linux-image-4-15-0-166-generic-lpaeubuntu-upgrade-linux-image-4-15-0-166-lowlatencyubuntu-upgrade-linux-image-4-4-0-1098-awsubuntu-upgrade-linux-image-4-4-0-1099-kvmubuntu-upgrade-linux-image-4-4-0-1134-awsubuntu-upgrade-linux-image-4-4-0-218-genericubuntu-upgrade-linux-image-4-4-0-218-lowlatencyubuntu-upgrade-linux-image-5-10-0-1053-oemubuntu-upgrade-linux-image-5-11-0-1021-kvmubuntu-upgrade-linux-image-5-11-0-1023-awsubuntu-upgrade-linux-image-5-11-0-1023-azureubuntu-upgrade-linux-image-5-11-0-1023-oracleubuntu-upgrade-linux-image-5-11-0-1024-gcpubuntu-upgrade-linux-image-5-11-0-1024-raspiubuntu-upgrade-linux-image-5-11-0-1024-raspi-nolpaeubuntu-upgrade-linux-image-5-11-0-44-genericubuntu-upgrade-linux-image-5-11-0-44-generic-64kubuntu-upgrade-linux-image-5-11-0-44-generic-lpaeubuntu-upgrade-linux-image-5-11-0-44-lowlatencyubuntu-upgrade-linux-image-5-13-0-1007-kvmubuntu-upgrade-linux-image-5-13-0-1008-awsubuntu-upgrade-linux-image-5-13-0-1008-gcpubuntu-upgrade-linux-image-5-13-0-1009-azureubuntu-upgrade-linux-image-5-13-0-1011-oracleubuntu-upgrade-linux-image-5-13-0-1012-raspiubuntu-upgrade-linux-image-5-13-0-1012-raspi-nolpaeubuntu-upgrade-linux-image-5-13-0-1026-oemubuntu-upgrade-linux-image-5-13-0-23-genericubuntu-upgrade-linux-image-5-13-0-23-generic-64kubuntu-upgrade-linux-image-5-13-0-23-generic-lpaeubuntu-upgrade-linux-image-5-13-0-23-lowlatencyubuntu-upgrade-linux-image-5-14-0-1013-oemubuntu-upgrade-linux-image-5-4-0-1010-ibmubuntu-upgrade-linux-image-5-4-0-1023-bluefieldubuntu-upgrade-linux-image-5-4-0-1029-gkeopubuntu-upgrade-linux-image-5-4-0-1048-raspiubuntu-upgrade-linux-image-5-4-0-1051-kvmubuntu-upgrade-linux-image-5-4-0-1057-gkeubuntu-upgrade-linux-image-5-4-0-1059-gcpubuntu-upgrade-linux-image-5-4-0-1059-oracleubuntu-upgrade-linux-image-5-4-0-1065-azureubuntu-upgrade-linux-image-5-4-0-92-genericubuntu-upgrade-linux-image-5-4-0-92-generic-lpaeubuntu-upgrade-linux-image-5-4-0-92-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-serverubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.