CVE-2022-0492

Published on: Not Yet Published

Last Modified on: 06/03/2022 06:15:00 PM UTC

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:

A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.

  • CVE-2022-0492 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 4.4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
[SECURITY] [DLA 2941-1] linux-4.19 security update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
[SECURITY] [DLA 2940-1] linux security update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
2051505 – (CVE-2022-0492) CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation bugzilla.redhat.com
text/html
URL Logo MISC bugzilla.redhat.com/show_bug.cgi?id=2051505
Debian -- Security Information -- DSA-5095-1 linux www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-5095
CVE-2022-0492 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20220419-0002/
Kernel Live Patch Security Notice LSN-0085-1 ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
Kernel Live Patch Security Notice LSN-0086-1 ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
Debian -- Security Information -- DSA-5096-1 linux www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-5096
kernel/git/torvalds/linux.git - Linux kernel source tree git.kernel.org
text/html
URL Logo MISC git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af

Related QID Numbers

  • 159639 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2022-9141)
  • 159640 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel-container (ELSA-2022-9142)
  • 159641 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2022-9147)
  • 159642 Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel-container (ELSA-2022-9148)
  • 159653 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9179)
  • 159671 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2022-9180)
  • 159700 Oracle Enterprise Linux Security Update for kernel (ELSA-2022-0825)
  • 159727 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2022-9245)
  • 159729 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9244)
  • 159760 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2022-9314)
  • 159763 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9313)
  • 159846 Oracle Enterprise Linux Security Update for kernel (ELSA-2022-4642)
  • 160012 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9667)
  • 179115 Debian Security Update for linux (DSA 5095-1)
  • 179117 Debian Security Update for linux (DSA 5096-1)
  • 179118 Debian Security Update for linux (DLA 2940-1)
  • 179119 Debian Security Update for linux-4.19 (DLA 2941-1)
  • 198672 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5302-1)
  • 198707 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5339-1)
  • 198708 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5337-1)
  • 198709 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5338-1)
  • 198728 Ubuntu Security Notification for Linux kernel (Intel IOTG) Vulnerabilities (USN-5362-1)
  • 198731 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5368-1)
  • 198740 Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-5377-1)
  • 240125 Red Hat Update for kernel-rt (RHSA-2022:0821)
  • 240128 Red Hat Update for kernel security (RHSA-2022:0825)
  • 240129 Red Hat Update for kernel security (RHSA-2022:0820)
  • 240130 Red Hat Update for kernel-rt (RHSA-2022:0819)
  • 240144 Red Hat Update for kpatch-patch (RHSA-2022:0849)
  • 240154 Red Hat Update for kpatch-patch (RHSA-2022:0925)
  • 240220 Red Hat Update for kernel-rt (RHSA-2022:1413)
  • 240221 Red Hat Update for kpatch-patch (RHSA-2022:1418)
  • 240224 Red Hat Update for kernel security (RHSA-2022:1455)
  • 240352 Red Hat Update for kpatch-patch (RHSA-2022:4655)
  • 240355 Red Hat Update for kernel-rt (RHSA-2022:4644)
  • 240356 Red Hat Update for kernel (RHSA-2022:4642)
  • 240418 Red Hat Update for kpatch-patch (RHSA-2022:0851)
  • 257171 CentOS Security Update for kernel (CESA-2022:4642)
  • 353160 Amazon Linux Security Advisory for kernel : ALAS2-2022-1749
  • 353161 Amazon Linux Security Advisory for kernel : ALAS-2022-1563
  • 353165 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-022
  • 353166 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-010
  • 353242 Amazon Linux Security Advisory for kernel : ALAC2012-2022-036
  • 353243 Amazon Linux Security Advisory for kmod-mlx5 : ALAC2012-2022-037
  • 353244 Amazon Linux Security Advisory for kmod-sfc : ALAC2012-2022-038
  • 610418 Google Pixel Android June 2022 Security Patch Missing
  • 610422 Google Android July 2022 Security Patch Missing for Huawei EMUI
  • 671441 EulerOS Security Update for kernel (EulerOS-SA-2022-1366)
  • 671561 EulerOS Security Update for kernel (EulerOS-SA-2022-1523)
  • 671703 EulerOS Security Update for kernel (EulerOS-SA-2022-1735)
  • 671723 EulerOS Security Update for kernel (EulerOS-SA-2022-1780)
  • 671724 EulerOS Security Update for kernel (EulerOS-SA-2022-1779)
  • 671726 EulerOS Security Update for kernel (EulerOS-SA-2022-1782)
  • 671727 EulerOS Security Update for kernel (EulerOS-SA-2022-1781)
  • 751831 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0768-1)
  • 751832 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0765-1)
  • 751833 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0757-1)
  • 751835 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0767-1)
  • 751836 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0759-1)
  • 751837 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0762-1)
  • 751838 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0766-1)
  • 751851 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0768-1)
  • 751852 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0755-1)
  • 751853 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0760-1)
  • 751939 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 27 for SLE 12 SP5) (SUSE-SU-2022:1012-1)
  • 751950 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (SUSE-SU-2022:1036-1)
  • 751999 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0760-1)
  • 900744 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8945)
  • 901650 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8966-1)
  • 940463 AlmaLinux Security Update for kernel (ALSA-2022:0825)
  • 960113 Rocky Linux Security Update for kernel-rt (RLSA-2022:819)
  • 960116 Rocky Linux Security Update for kernel (RLSA-2022:825)

Exploit/POC from Github

CVE-2022-0492 EXP and Analysis write up

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux18.04AllAllAll
Operating
System
CanonicalUbuntu Linux20.04AllAllAll
Operating
System
DebianDebian Linux10.0AllAllAll
Operating
System
DebianDebian Linux11.0AllAllAll
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
FedoraprojectFedora35AllAllAll
Operating
System
LinuxLinux KernelAllAllAllAll
Operating
System
LinuxLinux Kernel5.17rc1AllAll
Operating
System
LinuxLinux Kernel5.17rc2AllAll
HardwareNetappBaseboard Management Controller H300e-AllAllAll
HardwareNetappBaseboard Management Controller H300s-AllAllAll
HardwareNetappBaseboard Management Controller H410c-AllAllAll
HardwareNetappBaseboard Management Controller H410s-AllAllAll
HardwareNetappBaseboard Management Controller H500e-AllAllAll
HardwareNetappBaseboard Management Controller H500s-AllAllAll
HardwareNetappBaseboard Management Controller H700e-AllAllAll
HardwareNetappBaseboard Management Controller H700s-AllAllAll
HardwareNetappHci Compute Node-AllAllAll
ApplicationNetappSolidfire Enterprise Sds Hci Storage Node-AllAllAll
ApplicationNetappSolidfire Hci Management Node-AllAllAll
ApplicationRedhatCodeready Linux Builder8.0AllAllAll
ApplicationRedhatCodeready Linux Builder8.2AllAllAll
Operating
System
RedhatCodeready Linux Builder8.0AllAllAll
Operating
System
RedhatCodeready Linux Builder8.2AllAllAll
ApplicationRedhatCodeready Linux Builder For Power Little Endian8.0AllAllAll
ApplicationRedhatCodeready Linux Builder For Power Little Endian8.2AllAllAll
Operating
System
RedhatCodeready Linux Builder For Power Little Endian8.0AllAllAll
Operating
System
RedhatCodeready Linux Builder For Power Little Endian8.2AllAllAll
Operating
System
RedhatEnterprise Linux8.0AllAllAll
Operating
System
RedhatEnterprise Linux Eus8.2AllAllAll
Operating
System
RedhatEnterprise Linux For Ibm Z Systems8.0AllAllAll
Operating
System
RedhatEnterprise Linux For Ibm Z Systems Eus8.0AllAllAll
Operating
System
RedhatEnterprise Linux For Power Little Endian8.0AllAllAll
Operating
System
RedhatEnterprise Linux For Power Little Endian Eus8.0AllAllAll
Operating
System
RedhatEnterprise Linux For Real Time For Nfv Tus8.0AllAllAll
Operating
System
RedhatEnterprise Linux For Real Time For Nfv Tus8.2AllAllAll
Operating
System
RedhatEnterprise Linux For Real Time Tus8.0AllAllAll
Operating
System
RedhatEnterprise Linux For Real Time Tus8.2AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus8.2AllAllAll
Operating
System
RedhatEnterprise Linux Server For Power Little Endian Update Services For Sap Solutions8.1AllAllAll
Operating
System
RedhatEnterprise Linux Server For Power Little Endian Update Services For Sap Solutions8.2AllAllAll
Operating
System
RedhatEnterprise Linux Server Tus8.2AllAllAll
Operating
System
RedhatEnterprise Linux Server Update Services For Sap Solutions8.1AllAllAll
Operating
System
RedhatEnterprise Linux Server Update Services For Sap Solutions8.2AllAllAll
ApplicationRedhatVirtualization Host4.0AllAllAll
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h300e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h300s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h410c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h410s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h500e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h500s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h700e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:baseboard_management_controller_h700s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:solidfire\,_enterprise_sds_\&_hci_storage_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:codeready_linux_builder:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:codeready_linux_builder:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:codeready_linux_builder_for_power_little_endian:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:codeready_linux_builder_for_power_little_endian:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @softek_jp Linux Kernel の cgroups v1 の処理に権限を昇格される問題 (CVE-2022-0492) [41266] sid.softek.jp/content/show/4… #SIDfm #脆弱性情報 2022-02-09 06:35:07
Twitter Icon @CyberIQs_ New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can #infosec #infosecurity #cybersecurity #threatintel… twitter.com/i/web/status/1… 2022-03-03 18:03:13
Twitter Icon @yuvalavra Wrote a blog on the recent cgroup release_agent vuln, CVE-2022-0492, mostly focused on ctr escape prerequisites wit… twitter.com/i/web/status/1… 2022-03-03 18:08:54
Twitter Icon @NaveedHamid New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? ift.tt/zvt5a4p #cybersecurity 2022-03-03 18:11:14
Twitter Icon @FINSIN_CL "Unit42 Blog": New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? ... mas info aqui… twitter.com/i/web/status/1… 2022-03-03 18:15:09
Twitter Icon @CVEreport CVE-2022-0492 : A vulnerability was found in the #Linux #kernel’s cgroup_release_agent_write in the kernel/cgroup/c… twitter.com/i/web/status/1… 2022-03-03 19:02:39
Reddit Logo Icon /r/netsec New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? 2022-03-04 01:34:19
Reddit Logo Icon /r/SecOpsDaily New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? 2022-03-05 08:48:20
Reddit Logo Icon /r/linux New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? 2022-03-05 14:59:27
Reddit Logo Icon /r/kubernetes New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? 2022-03-05 19:28:03
Reddit Logo Icon /r/linux New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? 2022-03-06 08:00:38
Reddit Logo Icon /r/InfoSecNews CVE-2022-0492 flaw in Linux Kernel cgroups feature allows container escape 2022-03-06 21:45:46
Reddit Logo Icon /r/cybersecurity CVE-2022-0492 flaw in Linux Kernel cgroups feature allows container escape. A now-patched high-severity Linux kernel vulnerability, tracked as CVE-2022-0492 (CVSS score: 7.0), can be exploited by an attacker to escape a container to execute arbitrary commands on the container host. 2022-03-07 07:10:54
Reddit Logo Icon /r/programming CVE-2022-0492 flaw in Linux Kernel feature allows container escape 2022-03-08 17:21:52
Reddit Logo Icon /r/SecurityIT Kernel linux - altro buco (CVE-2022-0492) 2022-03-09 05:52:18
Reddit Logo Icon /r/linux Privilege Escalation Vulnerability CVE-2022-0492 and its impact on Kubernetes 2022-03-09 13:52:39
Reddit Logo Icon /r/InfoSecNews CVE-2022-0492: Privilege escalation vulnerability causing container escape 2022-03-09 15:12:33
Reddit Logo Icon /r/kubernetes Privilege Escalation Vulnerability CVE-2022-0492 and its impact on Kubernetes 2022-03-09 15:01:12
Reddit Logo Icon /r/devopsish Privilege Escalation Vulnerability CVE-2022-0492 and its impact on Kubernetes 2022-03-09 17:28:35
Reddit Logo Icon /r/technicaladversary New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? 2022-06-01 22:54:02
© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report