Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-4154

Опубликовано: 14 дек. 2021
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2022:081910.03.2022
Red Hat Enterprise Linux 8kernelFixedRHSA-2022:082510.03.2022
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2022:084914.03.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportkernel-rtFixedRHSA-2022:018719.01.2022
Red Hat Enterprise Linux 8.4 Extended Update SupportkernelFixedRHSA-2022:018619.01.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportkpatch-patchFixedRHSA-2022:023124.01.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2034514kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout

EPSS

Процентиль: 65%
0.00496
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 3 лет назад

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.

CVSS3: 8.8
nvd
больше 3 лет назад

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.

CVSS3: 8.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 8.8
debian
больше 3 лет назад

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgrou ...

CVSS3: 8.8
github
больше 3 лет назад

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.

EPSS

Процентиль: 65%
0.00496
Низкий

8.8 High

CVSS3