A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 20.04 | |
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 22.04 | |
debian_linux | eq | 9.0 | |
debian_linux | eq | 10.0 | |
debian_linux | eq | 11.0 | |
fedora | eq | 35 | |
linux_kernel | eq | 5.17 rc1 |
packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
bugzilla.redhat.com/show_bug.cgi?id=2051505
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
lists.debian.org/debian-lts-announce/2022/03/msg00011.html
lists.debian.org/debian-lts-announce/2022/03/msg00012.html
security.netapp.com/advisory/ntap-20220419-0002/
www.debian.org/security/2022/dsa-5095
www.debian.org/security/2022/dsa-5096