Privilege Escalation Affecting torvalds/linux package, versions [,5.16)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-3004099
  • published21 Apr 2022
  • disclosed21 Apr 2022
  • creditEric W. Biederman

Introduced: 21 Apr 2022

CVE-2021-4197  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 5.16 or higher.

Overview

Affected versions of this package are vulnerable to Privilege Escalation. An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged processes that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.

CVSS Base Scores

version 3.1