Vulnerability Description
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.24, < 4.9.301 |
| Debian | Debian Linux | 9.0 |
| Redhat | Codeready Linux Builder | 8.0 |
| Redhat | Codeready Linux Builder For Power Little Endian | 8.0 |
| Redhat | Virtualization Host | 4.0 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Eus | 8.2 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.0 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0 |
| Redhat | Enterprise Linux For Power Little Endian Eus | 8.0 |
| Redhat | Enterprise Linux For Real Time For Nfv Tus | 8.0 |
| Redhat | Enterprise Linux For Real Time Tus | 8.0 |
| Redhat | Enterprise Linux Server Aus | 8.2 |
| Redhat | Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | 8.1 |
| Redhat | Enterprise Linux Server Tus | 8.2 |
| Redhat | Enterprise Linux Server Update Services For Sap Solutions | 8.1 |
| Canonical | Ubuntu Linux | 14.04 |
| Fedoraproject | Fedora | 35 |
| Netapp | Solidfire\, Enterprise Sds \& Hci Storage Node | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2051505Issue TrackingPatchThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24PatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20220419-0002/Third Party Advisory
- https://www.debian.org/security/2022/dsa-5095Third Party Advisory
- https://www.debian.org/security/2022/dsa-5096Third Party Advisory
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2051505Issue TrackingPatchThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24PatchVendor Advisory
FAQ
What is CVE-2022-0492?
CVE-2022-0492 is a vulnerability with a CVSS score of 7.8 (HIGH). A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_a...
How severe is CVE-2022-0492?
CVE-2022-0492 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0492?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Redhat Codeready Linux Builder, Redhat Codeready Linux Builder For Power Little Endian, Redhat Virtualization Host.