{"id":136512,"date":"2022-03-06T23:02:30","date_gmt":"2022-03-07T07:02:30","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/03\/new-linux-kernel-cgroups-vulnerability-could-let-attackers-escape-container"},"modified":"2022-03-06T23:02:30","modified_gmt":"2022-03-07T07:02:30","slug":"new-linux-kernel-cgroups-vulnerability-could-let-attackers-escape-container","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/03\/new-linux-kernel-cgroups-vulnerability-could-let-attackers-escape-container","title":{"rendered":"New Linux Kernel cgroups Vulnerability Could Let Attackers Escape Container"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-linux-kernel-cgroups-vulnerability-could-let-attackers-escape-container.jpg\"><\/a><\/p>\n<p>Details have emerged about a now-patched high-severity vulnerability in the Linux kernel that could potentially be abused to escape a container in order to execute arbitrary commands on the container host.<\/p>\n<p>The shortcoming resides in a Linux kernel feature called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cgroups\" rel=\"noopener\" target=\"_blank\">control groups<\/a>, also referred to as cgroups version 1 (v1), which allows processes to be organized into hierarchical groups, thereby making it possible to limit and monitor the usage of resources such as CPU, memory, disk I\/O, and network.<\/p>\n<p>Tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-0492\" rel=\"noopener\" target=\"_blank\">CVE-2022\u20130492<\/a> (CVSS score: 7.0), the <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2022-0492\" rel=\"noopener\" target=\"_blank\">issue<\/a> <a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-0492\" rel=\"noopener\" target=\"_blank\">concerns<\/a> a <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2022-0492\" rel=\"noopener\" target=\"_blank\">case<\/a> of <a href=\"https:\/\/www.suse.com\/security\/cve\/CVE-2022-0492.html\" rel=\"noopener\" target=\"_blank\">privilege escalation<\/a> in the cgroups v1 release_agent functionality, a script that\u2019s executed following the termination of any process in the cgroup.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Details have emerged about a now-patched high-severity vulnerability in the Linux kernel that could potentially be abused to escape a container in order to execute arbitrary commands on the container host. The shortcoming resides in a Linux kernel feature called control groups, also referred to as cgroups version 1 (v1), which allows processes to be [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523],"tags":[],"class_list":["post-136512","post","type-post","status-publish","format-standard","hentry","category-computing"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=136512"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136512\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=136512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=136512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=136512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}