CVE-2021-4154

CWE-416Use After Free9 documents8 sources
Severity
8.8HIGH
EPSS
0.8%
top 25.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 4
Latest updateJun 1

Description

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages6 packages

Android:linux_kernel::0:2022-06-05
NVDlinux/linux_kernel5.15.4.134+4
CVEListV5kernelFixed in kernel 5.14 rc2
Debianlinux< 5.10.70-1+3

Also affects: Enterprise Linux 8.0

Patches

🔴Vulnerability Details

4
OSV
CVE-2021-4154: In cgroup1_parse_param of cgroup-v12022-06-01
GHSA
GHSA-qvm5-4fh7-hcfx: A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v12022-02-11
OSV
CVE-2021-4154: A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v12022-02-04
CVEList
CVE-2021-4154: A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v12022-02-04

📋Vendor Advisories

4
Android
CVE-2021-4154: Kernel2022-06-01
Microsoft
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by2022-02-08
Red Hat
kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout2021-12-14
Debian
CVE-2021-4154: linux - A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v...2021