A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel cgroup v1 parser, where a local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout and a denial of service problem on the system. Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0187 https://access.redhat.com/errata/RHSA-2022:0187
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0186 https://access.redhat.com/errata/RHSA-2022:0186
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0231 https://access.redhat.com/errata/RHSA-2022:0231
Created oVirt tracking bug for this issue: Affects: oVirt Node 4.4 [ bug 2047630 ]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0819 https://access.redhat.com/errata/RHSA-2022:0819
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0825 https://access.redhat.com/errata/RHSA-2022:0825
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:0841 https://access.redhat.com/errata/RHSA-2022:0841
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0849 https://access.redhat.com/errata/RHSA-2022:0849
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-4154