
CVE-2022-0492
- Reference to the description:
- Description:
- A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
- Last updated date:
- 12/07/2023
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 02/28/2022
- Reference url to background
https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/06/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/07/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/11/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 02/18/2023
- Reference url to background
https://github.com/T1erno/CVE-2022-0492-Docker-Breakout-Checker-and-PoC
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 12/01/2023