Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-4154

EPSS 0.84% · P75
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-4154

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在资源管理错误漏洞,该漏洞源于 Linux kernel 的 cgroup v1 解析器中 kernel/cgroup/cgroup-v1.c 中的 cgroup1_parse_param() 函数中的 use-after-free 错误。 本地用户可以通过 fsconfig syscall 参数执行任意代码,导致容器突破。该漏洞允许本地用户提升系统权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-kernel Fixed in kernel 5.14 rc2 -

II. Public POCs for CVE-2021-4154

#POC DescriptionSource LinkShenlong Link
1CVE-2021-4154 exploithttps://github.com/Markakd/CVE-2021-4154POC Details
2CVE-2021-4154https://github.com/veritas501/CVE-2021-4154POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-4154

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-02-04 · 140 CVEs total

CVE-2021-234708.2 HIGHPrototype Pollution
CVE-2021-234977.5 HIGHPrototype Pollution
CVE-2021-235077.5 HIGHPrototype Pollution
CVE-2021-44977iCMS 路径遍历漏洞
CVE-2022-24448Linux kernel 安全漏洞
CVE-2021-45408SeedDMS 输入验证错误漏洞
CVE-2022-24129Shibboleth 代码问题漏洞
CVE-2021-29398Northstar Club Management 路径遍历漏洞
CVE-2021-29397Northstar Club Management 安全漏洞
CVE-2021-29396Northstar Club Management 授权问题漏洞
CVE-2021-29395Northstar Club Management 路径遍历漏洞
CVE-2021-29394Northstar Club Management 安全漏洞
CVE-2021-29393Northstar Club Management 操作系统命令注入漏洞
CVE-2022-24249GPAC 代码问题漏洞
CVE-2021-45429YARA 缓冲区错误漏洞
CVE-2021-43635Codex 跨站脚本漏洞
CVE-2022-24262Voipmonitor 代码问题漏洞
CVE-2022-24260VoIPmonitor SQL注入漏洞
CVE-2022-24259Voipmonitor 授权问题漏洞
CVE-2021-44899Micro Star International Center 安全漏洞

Showing top 20 of 140 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-4154

No comments yet


Leave a comment