Bug 2047630 - CVE-2021-4154 kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout [ovirt-4.4]
Summary: CVE-2021-4154 kernel: local privilege escalation by exploiting the fsconfig s...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: ovirt-node
Classification: oVirt
Component: Included packages
Version: 4.4.10
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ovirt-4.4.10-2
: 4.4.10.2
Assignee: Sandro Bonazzola
QA Contact: Sandro Bonazzola
URL:
Whiteboard:
Depends On: 2034609
Blocks: CVE-2021-4154
TreeView+ depends on / blocked
 
Reported: 2022-01-28 07:20 UTC by Sandro Bonazzola
Modified: 2022-03-10 09:56 UTC (History)
11 users (show)

Fixed In Version: kernel-4.18.0-365.el8
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-03-10 09:56:32 UTC
oVirt Team: Node
Embargoed:
sbonazzo: ovirt-4.4+
cshao: testing_ack+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHV-44563 0 None None None 2022-01-28 07:45:38 UTC

Description Sandro Bonazzola 2022-01-28 07:20:51 UTC
This bug was created to ensure that one or more security vulnerabilities are fixed in affected versions of oVirt.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

Comment 2 Sandro Bonazzola 2022-02-21 14:12:59 UTC
As of Feb 21 2022 CentOS Stream includes kernel-4.18.0-365.el8 (https://koji.mbox.centos.org/koji/buildinfo?buildID=21111)

which contains the fix:
- fs: add vfs_parse_fs_param_source() helper (Waiman Long) [2034609]
- cgroup: verify that source is a string (Waiman Long) [2034609]


Note You need to log in before you can comment on or make changes to this bug.