CVE-2022-0492

7.8 HIGH

📋 TL;DR

CVE-2022-0492 is a Linux kernel vulnerability in the cgroups v1 release_agent feature that allows local attackers to escalate privileges and escape container namespaces. This affects Linux systems using cgroups v1 with the release_agent enabled, particularly containerized environments like Docker. Attackers can gain root access on the host system from within a container.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Linux kernel versions before 5.16.11, 5.15.28, 5.10.102, 5.4.177, and 4.19.232
Operating Systems: All Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires cgroups v1 with release_agent feature enabled. Many container environments use cgroups v2 by default, which is not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full container escape leading to complete host compromise, allowing attackers to execute arbitrary code as root on the underlying host system.

🟠

Likely Case

Privilege escalation within container environments, enabling attackers to break out of container isolation and access other containers or the host.

🟢

If Mitigated

Limited impact if cgroups v1 release_agent is disabled or proper security controls restrict cgroup access.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring access to the system.
🏢 Internal Only: HIGH - Critical risk for internal containerized environments where attackers could escape container boundaries.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and ability to write to cgroup files. Multiple public exploits exist demonstrating container escape.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.16.11, 5.15.28, 5.10.102, 5.4.177, 4.19.232 or later

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2051505

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. For container hosts, ensure Docker/container runtime is restarted after kernel update.

🔧 Temporary Workarounds

Disable cgroups v1 release_agent

linux

Disable the vulnerable cgroups v1 release_agent feature

echo 0 > /sys/fs/cgroup/release_agent
mount -o remount,ro /sys/fs/cgroup

Use cgroups v2

linux

Switch to cgroups v2 which is not vulnerable

Add 'systemd.unified_cgroup_hierarchy=1' to kernel boot parameters

🧯 If You Can't Patch

  • Disable cgroups v1 release_agent feature on all systems
  • Implement strict access controls to prevent unauthorized users from writing to cgroup files

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If below patched versions and cgroups v1 release_agent is enabled, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched: uname -r should show 5.16.11+, 5.15.28+, 5.10.102+, 5.4.177+, or 4.19.232+

📡 Detection & Monitoring

Log Indicators:

  • Unusual cgroup file writes
  • Suspicious container escape attempts
  • Unexpected privilege escalation events

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="kernel" AND ("cgroup" OR "release_agent") AND ("write" OR "modify")

🔗 References

📤 Share & Export