vulnerability

Ubuntu: (Multiple Advisories) (CVE-2021-4002): Linux kernel (OEM) vulnerability

Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
Jan 6, 2022
Added
Jan 6, 2022
Modified
Aug 18, 2025

Description

A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.

Solutions

ubuntu-upgrade-linux-image-3-13-0-189-genericubuntu-upgrade-linux-image-3-13-0-189-generic-lpaeubuntu-upgrade-linux-image-3-13-0-189-lowlatencyubuntu-upgrade-linux-image-4-15-0-1033-dell300xubuntu-upgrade-linux-image-4-15-0-1085-oracleubuntu-upgrade-linux-image-4-15-0-1101-raspi2ubuntu-upgrade-linux-image-4-15-0-1105-kvmubuntu-upgrade-linux-image-4-15-0-1114-gcpubuntu-upgrade-linux-image-4-15-0-1118-awsubuntu-upgrade-linux-image-4-15-0-1118-snapdragonubuntu-upgrade-linux-image-4-15-0-1129-azureubuntu-upgrade-linux-image-4-15-0-166-genericubuntu-upgrade-linux-image-4-15-0-166-generic-lpaeubuntu-upgrade-linux-image-4-15-0-166-lowlatencyubuntu-upgrade-linux-image-4-4-0-1098-awsubuntu-upgrade-linux-image-4-4-0-1099-kvmubuntu-upgrade-linux-image-4-4-0-1134-awsubuntu-upgrade-linux-image-4-4-0-218-genericubuntu-upgrade-linux-image-4-4-0-218-lowlatencyubuntu-upgrade-linux-image-5-10-0-1053-oemubuntu-upgrade-linux-image-5-11-0-1021-kvmubuntu-upgrade-linux-image-5-11-0-1023-awsubuntu-upgrade-linux-image-5-11-0-1023-azureubuntu-upgrade-linux-image-5-11-0-1023-oracleubuntu-upgrade-linux-image-5-11-0-1024-gcpubuntu-upgrade-linux-image-5-11-0-1024-raspiubuntu-upgrade-linux-image-5-11-0-1024-raspi-nolpaeubuntu-upgrade-linux-image-5-11-0-44-genericubuntu-upgrade-linux-image-5-11-0-44-generic-64kubuntu-upgrade-linux-image-5-11-0-44-generic-lpaeubuntu-upgrade-linux-image-5-11-0-44-lowlatencyubuntu-upgrade-linux-image-5-13-0-1007-kvmubuntu-upgrade-linux-image-5-13-0-1008-awsubuntu-upgrade-linux-image-5-13-0-1008-gcpubuntu-upgrade-linux-image-5-13-0-1009-azureubuntu-upgrade-linux-image-5-13-0-1011-oracleubuntu-upgrade-linux-image-5-13-0-1012-raspiubuntu-upgrade-linux-image-5-13-0-1012-raspi-nolpaeubuntu-upgrade-linux-image-5-13-0-1026-oemubuntu-upgrade-linux-image-5-13-0-23-genericubuntu-upgrade-linux-image-5-13-0-23-generic-64kubuntu-upgrade-linux-image-5-13-0-23-generic-lpaeubuntu-upgrade-linux-image-5-13-0-23-lowlatencyubuntu-upgrade-linux-image-5-14-0-1013-oemubuntu-upgrade-linux-image-5-4-0-1010-ibmubuntu-upgrade-linux-image-5-4-0-1023-bluefieldubuntu-upgrade-linux-image-5-4-0-1029-gkeopubuntu-upgrade-linux-image-5-4-0-1048-raspiubuntu-upgrade-linux-image-5-4-0-1051-kvmubuntu-upgrade-linux-image-5-4-0-1057-gkeubuntu-upgrade-linux-image-5-4-0-1059-gcpubuntu-upgrade-linux-image-5-4-0-1059-oracleubuntu-upgrade-linux-image-5-4-0-1065-azureubuntu-upgrade-linux-image-5-4-0-92-genericubuntu-upgrade-linux-image-5-4-0-92-generic-lpaeubuntu-upgrade-linux-image-5-4-0-92-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-serverubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.