CVE-2022-0492
high-risk
Published 2022-03-03
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
Do I need to act?
~
5.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
Codeready Linux Builder For Power Little Endian
Codeready Linux Builder For Power Little Endian
References (20)
Third Party Advisory
http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LS...
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2051505
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220419-0002/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5095
Third Party Advisory
https://www.debian.org/security/2022/dsa-5096
Third Party Advisory
http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LS...
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2051505
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220419-0002/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5095
Third Party Advisory
https://www.debian.org/security/2022/dsa-5096
57
/ 100
high-risk
Severity
24/34 · High
Exploitability
8/34 · Low
Exposure
25/34 · High