CVE-2021-4002
Public on 2022-01-06
Modified on 2022-02-04
Description
A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
HAQM Linux 1 | kernel | 2022-02-04 | ALAS-2022-1563 | Fixed |
HAQM Linux 1 | kernel | 2023-02-17 | ALAS-2023-1688 | Fixed |
HAQM Linux 2 - Core | kernel | 2021-12-08 | ALAS2-2021-1727 | Fixed |
HAQM Linux 2 - Core | kernel | 2025-01-30 | ALAS2-2025-2752 | Fixed |
HAQM Linux 2 - Kernel-5.10 Extra | kernel | 2022-01-21 | ALAS2KERNEL-5.10-2022-008 | Fixed |
HAQM Linux 2 - Kernel-5.10 Extra | kernel | 2024-02-01 | ALAS2KERNEL-5.10-2024-049 | Fixed |
HAQM Linux 2 - Kernel-5.4 Extra | kernel | 2022-01-20 | ALAS2KERNEL-5.4-2022-010 | Fixed |
HAQM Linux 2 - Kernel-5.4 Extra | kernel | 2025-01-31 | ALAS2KERNEL-5.4-2025-093 | Fixed |
HAQM Linux 2 - Livepatch Extra | kernel-livepatch-4.14.246-187.474 | 2021-12-02 | ALAS2LIVEPATCH-2021-072 | Fixed |
HAQM Linux 2 - Livepatch Extra | kernel-livepatch-4.14.248-189.473 | 2021-12-02 | ALAS2LIVEPATCH-2021-071 | Fixed |
HAQM Linux 2 - Livepatch Extra | kernel-livepatch-4.14.252-195.481 | 2021-12-02 | ALAS2LIVEPATCH-2021-070 | Fixed |
HAQM Linux 2 - Livepatch Extra | kernel-livepatch-4.14.252-195.483 | 2021-12-02 | ALAS2LIVEPATCH-2021-069 | Fixed |
HAQM Linux 2 - Livepatch Extra | kernel-livepatch-5.10.62-55.141 | 2021-12-02 | ALAS2LIVEPATCH-2021-074 | Fixed |
HAQM Linux 2 - Livepatch Extra | kernel-livepatch-5.10.68-62.173 | 2021-12-02 | ALAS2LIVEPATCH-2021-073 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
HAQM Linux | CVSSv3 | 5.1 | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
NVD | CVSSv2 | 3.6 | AV:L/AC:L/Au:N/C:P/I:P/A:N |
NVD | CVSSv3 | 4.4 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |