vulnerability

Ubuntu: (Multiple Advisories) (CVE-2021-4002): Linux kernel (OEM) vulnerability

Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
Jan 6, 2022
Added
Jan 6, 2022
Modified
Jan 23, 2025

Description

A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-189-genericubuntu-upgrade-linux-image-3-13-0-189-generic-lpaeubuntu-upgrade-linux-image-3-13-0-189-lowlatencyubuntu-upgrade-linux-image-4-15-0-1033-dell300xubuntu-upgrade-linux-image-4-15-0-1085-oracleubuntu-upgrade-linux-image-4-15-0-1101-raspi2ubuntu-upgrade-linux-image-4-15-0-1105-kvmubuntu-upgrade-linux-image-4-15-0-1114-gcpubuntu-upgrade-linux-image-4-15-0-1118-awsubuntu-upgrade-linux-image-4-15-0-1118-snapdragonubuntu-upgrade-linux-image-4-15-0-1129-azureubuntu-upgrade-linux-image-4-15-0-166-genericubuntu-upgrade-linux-image-4-15-0-166-generic-lpaeubuntu-upgrade-linux-image-4-15-0-166-lowlatencyubuntu-upgrade-linux-image-4-4-0-1098-awsubuntu-upgrade-linux-image-4-4-0-1099-kvmubuntu-upgrade-linux-image-4-4-0-1134-awsubuntu-upgrade-linux-image-4-4-0-218-genericubuntu-upgrade-linux-image-4-4-0-218-lowlatencyubuntu-upgrade-linux-image-5-10-0-1053-oemubuntu-upgrade-linux-image-5-11-0-1021-kvmubuntu-upgrade-linux-image-5-11-0-1023-awsubuntu-upgrade-linux-image-5-11-0-1023-azureubuntu-upgrade-linux-image-5-11-0-1023-oracleubuntu-upgrade-linux-image-5-11-0-1024-gcpubuntu-upgrade-linux-image-5-11-0-1024-raspiubuntu-upgrade-linux-image-5-11-0-1024-raspi-nolpaeubuntu-upgrade-linux-image-5-11-0-44-genericubuntu-upgrade-linux-image-5-11-0-44-generic-64kubuntu-upgrade-linux-image-5-11-0-44-generic-lpaeubuntu-upgrade-linux-image-5-11-0-44-lowlatencyubuntu-upgrade-linux-image-5-13-0-1007-kvmubuntu-upgrade-linux-image-5-13-0-1008-awsubuntu-upgrade-linux-image-5-13-0-1008-gcpubuntu-upgrade-linux-image-5-13-0-1009-azureubuntu-upgrade-linux-image-5-13-0-1011-oracleubuntu-upgrade-linux-image-5-13-0-1012-raspiubuntu-upgrade-linux-image-5-13-0-1012-raspi-nolpaeubuntu-upgrade-linux-image-5-13-0-1026-oemubuntu-upgrade-linux-image-5-13-0-23-genericubuntu-upgrade-linux-image-5-13-0-23-generic-64kubuntu-upgrade-linux-image-5-13-0-23-generic-lpaeubuntu-upgrade-linux-image-5-13-0-23-lowlatencyubuntu-upgrade-linux-image-5-14-0-1013-oemubuntu-upgrade-linux-image-5-4-0-1010-ibmubuntu-upgrade-linux-image-5-4-0-1023-bluefieldubuntu-upgrade-linux-image-5-4-0-1029-gkeopubuntu-upgrade-linux-image-5-4-0-1048-raspiubuntu-upgrade-linux-image-5-4-0-1051-kvmubuntu-upgrade-linux-image-5-4-0-1057-gkeubuntu-upgrade-linux-image-5-4-0-1059-gcpubuntu-upgrade-linux-image-5-4-0-1059-oracleubuntu-upgrade-linux-image-5-4-0-1065-azureubuntu-upgrade-linux-image-5-4-0-92-genericubuntu-upgrade-linux-image-5-4-0-92-generic-lpaeubuntu-upgrade-linux-image-5-4-0-92-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-serverubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.