A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=2034514 | Issue Tracking Patch Third Party Advisory | 
| https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002 | Third Party Advisory | 
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b | Mailing List Patch Vendor Advisory | 
| https://security.netapp.com/advisory/ntap-20220225-0004/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
Configuration 3 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2022-02-04 23:15
Updated : 2023-01-19 15:53
NVD link : CVE-2021-4154
Mitre link : CVE-2021-4154
CVE.ORG link : CVE-2021-4154
JSON object : View
Products Affected
                redhat
- enterprise_linux
 - virtualization
 
linux
- linux_kernel
 
netapp
- hci_baseboard_management_controller
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
