Headline
CVE-2021-4154: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel’s cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
Description msiddiqu 2021-12-21 07:54:42 UTC
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel cgroup v1 parser, where a local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout and a denial of service problem on the system.
Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
Comment 11 errata-xmlrpc 2022-01-19 14:18:42 UTC
This issue has been addressed in the following products:
Red Hat Enterprise Linux 8.4 Extended Update Support
Via RHSA-2022:0187 https://access.redhat.com/errata/RHSA-2022:0187
Comment 12 errata-xmlrpc 2022-01-19 14:42:28 UTC
This issue has been addressed in the following products:
Red Hat Enterprise Linux 8.4 Extended Update Support
Via RHSA-2022:0186 https://access.redhat.com/errata/RHSA-2022:0186
Comment 13 errata-xmlrpc 2022-01-24 09:48:23 UTC
This issue has been addressed in the following products:
Red Hat Enterprise Linux 8.4 Extended Update Support
Via RHSA-2022:0231 https://access.redhat.com/errata/RHSA-2022:0231
Comment 14 Sandro Bonazzola 2022-01-28 07:23:22 UTC
Created oVirt tracking bug for this issue:
Affects: oVirt Node 4.4 [ bug 2047630 ]