First published: Mon Nov 22 2021(Updated: )
A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
redhat/kernel | <5.16 | 5.16 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Linux Kernel | <5.16 | |
Linux Kernel | =5.16 | |
Linux Kernel | =5.16-rc1 | |
Linux Kernel | =5.16-rc2 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =35 | |
oracle communications Cloud native core binding support function | =22.1.3 | |
oracle communications cloud native core network exposure function | =22.1.1 | |
oracle communications Cloud native core policy | =22.2.0 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-4002 is categorized as medium.
To fix CVE-2021-4002, update the Linux kernel to version 0:4.18.0-372.9.1.rt7.166.el8 or 0:4.18.0-372.9.1.el8 or any appropriate version that addresses the vulnerability.
CVE-2021-4002 affects local users on systems running vulnerable versions of the Linux kernel where hugetlbfs is utilized.
CVE-2021-4002 is a memory leak vulnerability in the Linux kernel's hugetlbfs memory usage.
Yes, CVE-2021-4002 could allow a local user to gain unauthorized access to sensitive data.