CVE-2022-0492

HIGH

Docker cgroups Container Escape

Title source: metasploit
STIX 2.1

Description

A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.

Exploits (10)

nomisec SCANNER 48 stars
by PaloAltoNetworks · poc
https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492
nomisec WORKING POC 33 stars
by chenaotian · poc
https://github.com/chenaotian/CVE-2022-0492
nomisec SCANNER 11 stars
by SofianeHamlaoui · poc
https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker
nomisec WORKING POC 5 stars
by T1erno · poc
https://github.com/T1erno/CVE-2022-0492-Docker-Breakout-Checker-and-PoC
nomisec WORKING POC 2 stars
by yoeelingBin · poc
https://github.com/yoeelingBin/CVE-2022-0492-Container-Escape
nomisec STUB
by Perimora · poc
https://github.com/Perimora/cve_2022_0492
nomisec WRITEUP
by Trinadh465 · poc
https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492
nomisec SCANNER
by bb33bb · poc
https://github.com/bb33bb/CVE-2022-0492
metasploit WORKING POC EXCELLENT
by h00die, Yiqi Sun, Kevin Wang, T1erno · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/docker_cgroup_escape.rb

Scores

CVSS v3 7.8
EPSS 0.0879
EPSS Percentile 92.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-862 CWE-287
Status published
Products (43)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
canonical/ubuntu_linux 22.04
debian/debian_linux 9.0
debian/debian_linux 10.0
debian/debian_linux 11.0
fedoraproject/fedora 35
linux/linux_kernel 5.17 rc1 (2 CPE variants)
... and 33 more
Published Mar 03, 2022
Tracked Since Feb 18, 2026