A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=2051505 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220419-0002/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5095 | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5096 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
07 Dec 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Nov 2023, 13:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netapp h300e
Netapp h410s Netapp h500e Netapp h700s Netapp h700e Netapp h410c Netapp h500s Netapp h300s |
|
CPE | cpe:2.3:h:netapp:baseboard_management_controller_h300e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h500e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h700e:-:*:*:*:*:*:*:* |
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* |
21 Jul 2023, 17:07
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 |
Information
Published : 2022-03-03 19:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-0492
Mitre link : CVE-2022-0492
CVE.ORG link : CVE-2022-0492
JSON object : View
Products Affected
redhat
- enterprise_linux_for_real_time_for_nfv_tus
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- enterprise_linux_server_tus
- enterprise_linux_for_power_little_endian
- enterprise_linux
- codeready_linux_builder
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_for_ibm_z_systems_eus
- codeready_linux_builder_for_power_little_endian
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux_for_real_time_tus
- virtualization_host
netapp
- h300e
- h300s
- h700s
- solidfire_\&_hci_management_node
- solidfire\,_enterprise_sds_\&_hci_storage_node
- h410c
- hci_compute_node
- h410s
- h700e
- h500s
- h500e
fedoraproject
- fedora
canonical
- ubuntu_linux
linux
- linux_kernel
debian
- debian_linux