vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-4002): Linux kernel (OEM) vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:L/Au:N/C:P/I:P/A:N) | Jan 6, 2022 | Jan 6, 2022 | Jan 23, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
Jan 6, 2022
Added
Jan 6, 2022
Modified
Jan 23, 2025
Description
A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-189-genericubuntu-upgrade-linux-image-3-13-0-189-generic-lpaeubuntu-upgrade-linux-image-3-13-0-189-lowlatencyubuntu-upgrade-linux-image-4-15-0-1033-dell300xubuntu-upgrade-linux-image-4-15-0-1085-oracleubuntu-upgrade-linux-image-4-15-0-1101-raspi2ubuntu-upgrade-linux-image-4-15-0-1105-kvmubuntu-upgrade-linux-image-4-15-0-1114-gcpubuntu-upgrade-linux-image-4-15-0-1118-awsubuntu-upgrade-linux-image-4-15-0-1118-snapdragonubuntu-upgrade-linux-image-4-15-0-1129-azureubuntu-upgrade-linux-image-4-15-0-166-genericubuntu-upgrade-linux-image-4-15-0-166-generic-lpaeubuntu-upgrade-linux-image-4-15-0-166-lowlatencyubuntu-upgrade-linux-image-4-4-0-1098-awsubuntu-upgrade-linux-image-4-4-0-1099-kvmubuntu-upgrade-linux-image-4-4-0-1134-awsubuntu-upgrade-linux-image-4-4-0-218-genericubuntu-upgrade-linux-image-4-4-0-218-lowlatencyubuntu-upgrade-linux-image-5-10-0-1053-oemubuntu-upgrade-linux-image-5-11-0-1021-kvmubuntu-upgrade-linux-image-5-11-0-1023-awsubuntu-upgrade-linux-image-5-11-0-1023-azureubuntu-upgrade-linux-image-5-11-0-1023-oracleubuntu-upgrade-linux-image-5-11-0-1024-gcpubuntu-upgrade-linux-image-5-11-0-1024-raspiubuntu-upgrade-linux-image-5-11-0-1024-raspi-nolpaeubuntu-upgrade-linux-image-5-11-0-44-genericubuntu-upgrade-linux-image-5-11-0-44-generic-64kubuntu-upgrade-linux-image-5-11-0-44-generic-lpaeubuntu-upgrade-linux-image-5-11-0-44-lowlatencyubuntu-upgrade-linux-image-5-13-0-1007-kvmubuntu-upgrade-linux-image-5-13-0-1008-awsubuntu-upgrade-linux-image-5-13-0-1008-gcpubuntu-upgrade-linux-image-5-13-0-1009-azureubuntu-upgrade-linux-image-5-13-0-1011-oracleubuntu-upgrade-linux-image-5-13-0-1012-raspiubuntu-upgrade-linux-image-5-13-0-1012-raspi-nolpaeubuntu-upgrade-linux-image-5-13-0-1026-oemubuntu-upgrade-linux-image-5-13-0-23-genericubuntu-upgrade-linux-image-5-13-0-23-generic-64kubuntu-upgrade-linux-image-5-13-0-23-generic-lpaeubuntu-upgrade-linux-image-5-13-0-23-lowlatencyubuntu-upgrade-linux-image-5-14-0-1013-oemubuntu-upgrade-linux-image-5-4-0-1010-ibmubuntu-upgrade-linux-image-5-4-0-1023-bluefieldubuntu-upgrade-linux-image-5-4-0-1029-gkeopubuntu-upgrade-linux-image-5-4-0-1048-raspiubuntu-upgrade-linux-image-5-4-0-1051-kvmubuntu-upgrade-linux-image-5-4-0-1057-gkeubuntu-upgrade-linux-image-5-4-0-1059-gcpubuntu-upgrade-linux-image-5-4-0-1059-oracleubuntu-upgrade-linux-image-5-4-0-1065-azureubuntu-upgrade-linux-image-5-4-0-92-genericubuntu-upgrade-linux-image-5-4-0-92-generic-lpaeubuntu-upgrade-linux-image-5-4-0-92-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-serverubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.