8.8
CVSSv3

CVE-2021-4154

Published: 04/02/2022 Updated: 19/01/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.8 | Impact Score: 6 | Exploitability Score: 2
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 5.14

linux linux kernel

redhat virtualization 4.0

redhat enterprise linux 8.0

netapp hci baseboard management controller h300s

netapp hci baseboard management controller h500s

netapp hci baseboard management controller h700s

netapp hci baseboard management controller h300e

netapp hci baseboard management controller h500e

netapp hci baseboard management controller h700e

netapp hci baseboard management controller h410s

Vendor Advisories

Synopsis Important: kpatch-patch security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kpatch-patch is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as ...
Synopsis Moderate: OpenShift Container Platform 4742 security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4742 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Container Platfo ...
Synopsis Important: Red Hat Virtualization Host security and bug fix update [ovirt-4410] Async #1 Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for redhat-release-virtualization-host and redhat-virtualizatio ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this upd ...
Synopsis Moderate: Red Hat Advanced Cluster Management 243 security updates and bug fixes Type/Severity Security Advisory: Moderate Topic Red Hat Advanced Cluster Management for Kubernetes 243 General Availability release images This update provides security fixes, bug fixes, and updates the container imagesRed Hat Product Security has ...
Synopsis Moderate: Migration Toolkit for Containers (MTC) 154 security update Type/Severity Security Advisory: Moderate Topic The Migration Toolkit for Containers (MTC) 154 is now availableRed Hat Product Security has rated this update as having a security impactof Moderate A Common Vulnerability Scoring System (CVSS) base score, whichg ...
Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated ...
Synopsis Moderate: Red Hat Advanced Cluster Management 238 security and container updates Type/Severity Security Advisory: Moderate Topic Red Hat Advanced Cluster Management for Kubernetes 238 GeneralAvailability release images, which provide security and container updatesRed Hat Product Security has rated this update as having a securit ...

Github Repositories

CVE-2021-4154 exploit

CVE-2021-4154 This bug was fix in gitkernelorg/pub/scm/linux/kernel/git/torvalds/linuxgit/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b This exploit works on most pre-patch kernels for: CentOS 8 kernels higher than linux-4180-305el8 Debian 11 kernels higher than 5100-8 Fedora 31/32/33 kernels higher than 537-301fc31 Ubuntu 18/20 kernels higher than 54

Kernel exploitation technique

DirtyCred: Escalating Privilege in Linux Kernel DirtyCred is a kernel exploitation concept that swaps unprivileged kernel credentials with privileged ones to escalate privilege Instead of overwriting any critical data fields on kernel heap, DirtyCred abuses the heap memory reuse mechanism to get privileged Although the concept is simple, it is effective See the Blackhat p

A eBPF framework to prevent discovered error from being triggered

PET our paper: PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel 1-evaluation: the artifact evaluation programs 2-source-code: more implemtation details 3-user-guidance: helper individuals develop new BPF prevention programs abstract This artifact is applying for an Artifacts Available badge, an Artifacts Functional badge, and an Results Reproduced b