First published: Tue Dec 14 2021(Updated: )
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.20.1.rt7.150.el8_5 | 0:4.18.0-348.20.1.rt7.150.el8_5 |
redhat/kernel | <0:4.18.0-348.20.1.el8_5 | 0:4.18.0-348.20.1.el8_5 |
redhat/kernel-rt | <0:4.18.0-305.34.2.rt7.107.el8_4 | 0:4.18.0-305.34.2.rt7.107.el8_4 |
redhat/kernel | <0:4.18.0-305.34.2.el8_4 | 0:4.18.0-305.34.2.el8_4 |
Linux Linux kernel | >=5.1<5.4.134 | |
Linux Linux kernel | >=5.5<5.10.52 | |
Linux Linux kernel | >=5.11<5.12.19 | |
Linux Linux kernel | >=5.13<5.13.4 | |
Linux Linux kernel | =5.14-rc1 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =8.0 | |
Netapp Hci Baseboard Management Controller | =h300e | |
Netapp Hci Baseboard Management Controller | =h300s | |
Netapp Hci Baseboard Management Controller | =h410s | |
Netapp Hci Baseboard Management Controller | =h500e | |
Netapp Hci Baseboard Management Controller | =h500s | |
Netapp Hci Baseboard Management Controller | =h700e | |
Netapp Hci Baseboard Management Controller | =h700s | |
redhat/kernel | <5.14 | 5.14 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this issue is CVE-2021-4154.
CVE-2021-4154 has a severity score of 8.8, which is considered high.
CVE-2021-4154 is a use-after-free flaw in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c, which can lead to a privilege escalation, container breakout, and a denial of service attack.
The affected software includes Google Android, Red Hat Kernel (up to version 5.14), Red Hat Kernel-RT (up to version 4.18.0-348.20.1), and Red Hat Kernel (up to version 4.18.0-305.34.2).
To fix the CVE-2021-4154 vulnerability, you should update your software to the recommended versions provided by the respective vendors.