{"vulnerability": "CVE-2022-0185", "sightings": [{"uuid": "2e05dd69-3d49-48f4-b7ae-dd1604f0df77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/poxek/542", "content": "\u200bCVE-2022-0185\n\n\u0418\u043c\u0435\u044f \u043f\u0440\u0430\u0432\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c root. \n\n\u0414\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0430\u0446\u0438\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0435\u0441\u0442\u044c \u043d\u0430 Github. \n\n\u041f\u043e\u0434\u043e\u0431\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0432\u043e \u0432\u0441\u0435\u0445 Ubuntu \u0438\u0437-\u0437\u0430 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0442\u0430\u043c \u043f\u043e \u0434\u0435\u0444\u043e\u043b\u0442\u0443 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u044b user namespaces, \u0447\u0435\u0433\u043e \u043d\u0435\u0442, \u043a \u043f\u0440\u0438\u043c\u0435\u0440\u0443, \u0432 Debian \u0438 RHEL, \u0435\u0441\u043b\u0438 \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u044b.\n\n\u042d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 Linux 5.1 \u0438 \u0432\u044b\u0448\u0435, \u0442\u0430\u043a \u0447\u0442\u043e \u0432\u0441\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0434\u0438\u0441\u0442\u0440\u044b \u0441 \u044d\u0442\u0438\u043c \u044f\u0434\u0440\u043e\u043c \u0442\u043e\u0436\u0435 \u0435\u0439 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0438 \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f, \u0435\u0441\u043b\u0438 \u043d\u0430 \u0445\u043e\u0441\u0442\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u044b. \u0415\u0441\u043b\u0438 \u0443 \u0432\u0430\u0441 Centos 7 \u0438\u043b\u0438 Ubuntu 18, \u043c\u043e\u0436\u043d\u043e \u043d\u0435 \u0441\u0443\u0435\u0442\u0438\u0442\u044c\u0441\u044f. \u0422\u0430\u043c \u0431\u043e\u043b\u0435\u0435 \u0441\u0442\u0430\u0440\u044b\u0435 \u044f\u0434\u0440\u0430. \n\n\u0415\u0441\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u043e \u043a\u0430\u043a\u043e\u0439-\u0442\u043e \u043f\u0440\u0438\u0447\u0438\u043d\u0435 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0442\u043e user_namespaces Redhat \u0441\u043e\u0432\u0435\u0442\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u043e\u0442 \u0442\u0430\u043a:\n\n# echo \"user.max_user_namespaces=0\" &gt; /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\n\u0410 Ubuntu \u0442\u0430\u043a:\n# sysctl -w kernel.unprivileged_userns_clone = 0\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e \u043a\u043e\u0434, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0439 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d \u043e\u043a\u043e\u043b\u043e \u0442\u0440\u0435\u0445 \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434. \u041a\u0442\u043e-\u0442\u043e \u0432\u0441\u0451 \u044d\u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043c\u043e\u0433 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c. \u0410 \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0438\u0445 \u0435\u0449\u0451 \u0442\u0430\u043a\u0438\u0445 \u0442\u0430\u043c \u0435\u0441\u0442\u044c?\n\nhttps://ubuntu.com/security/CVE-2022-0185\nhttps://access.redhat.com/security/cve/CVE-2022-0185\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2040358\n\n#infosec #pentesting #linux #cve #security #ubuntu #docker #devops", "creation_timestamp": "2022-01-24T07:36:35.000000Z"}, {"uuid": "502c3458-f3b3-4cc7-a0b9-134f70ef399d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/152", "content": "CVE-2022-0185: Exploiting a kernel heap buffer overflow for LPE\n\nclubby789 published a detailed write-up about discovering and exploiting CVE-2022-0185 in the FS subsystem of the Linux kernel.\n\nExploit primitives:\n\u25aa\ufe0fKernel pointer leak and arbitrary writing using msg_msg\n\u25aa\ufe0fExploiting FUSE to control the race condition\n\u25aa\ufe0fOverwriting the modprobe_path for privilege escalation", "creation_timestamp": "2022-08-24T14:39:31.000000Z"}, {"uuid": "eec0b8e4-fc57-45e6-a36d-bd4285f521ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/147", "content": "CVE-2022-0185 - Winning a $31337 Bounty after Pwning Ubuntu and Escaping Google's KCTF Containers\n\nAn article describing an exploit for a slab-out-of-bounds bug in the fsconfig syscall handler. By FizzBuzz101, @clubby789, @ryaagard, @Chronos190, @ginkoid, and @chop0_.\n\nAuthors managed to both get LPE on the Ubuntu kernel and escape the kCTF infrastructure container, and thus claim the kCTF VRP bounty.\n\nThe bug was found with syzkaller, and it was also reported by syzbot.", "creation_timestamp": "2022-01-26T00:55:41.000000Z"}, {"uuid": "6ee4fd87-fc28-499a-a5cf-5cf3470c460e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/148", "content": "CVE-2022-0185: Linux kernel slab out-of-bounds write: exploit and writeup\n\nAn article by @lockedbyte with another write-up for the slab-out-of-bounds bug in the fsconfig syscall handler. The exploit is attached to the oss-security post.", "creation_timestamp": "2022-01-26T00:54:54.000000Z"}, {"uuid": "3cfa4ae5-510d-4f9c-94fd-0bc9c643ff78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/itsec_news/217", "content": "\ud83d\udd16 \u041f\u043e\u0434\u0431\u043e\u0440\u043a\u0430 \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439 \ud83d\udc47\n\n\u26a1\ufe0f \u0412 \u0434\u0430\u0440\u043a\u043d\u0435\u0442\u0435 \u043d\u0430\u0447\u0430\u043b\u0438 \u043f\u0440\u043e\u0434\u0430\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 48 \u043c\u043b\u043d \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0432 \u043e \u0432\u0430\u043a\u0446\u0438\u043d\u0430\u0446\u0438\u0438 \u043e\u0442 \u043a\u043e\u0440\u043e\u043d\u0430\u0432\u0438\u0440\u0443\u0441\u0430.\n\n\ud83d\udcac \u0421\u0442\u043e\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0432\u043e\u0435\u0433\u043e \u00ab\u0442\u043e\u0432\u0430\u0440\u0430\u00bb \u0445\u0430\u043a\u0435\u0440 \u043e\u0446\u0435\u043d\u0438\u043b \u0432 100 \u0442\u044b\u0441\u044f\u0447 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432. \u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u043e\u0431\u0435\u0437\u043b\u0438\u0447\u0435\u043d\u043d\u044b\u043c\u0438. \u0423 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0438\u043c\u0435\u044e\u0442\u0441\u044f \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u043e \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0438 \u0432\u0430\u043a\u0446\u0438\u043d\u044b, QR-\u043a\u043e\u0434\u0435 \u0438 \u043f\u0430\u0441\u043f\u043e\u0440\u0442\u0435 \u0433\u0440\u0430\u0436\u0434\u0430\u043d. \u0417\u0430 \u0432\u0440\u0435\u043c\u044f \u043f\u0430\u043d\u0434\u0435\u043c\u0438\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0443\u0447\u0430\u0441\u0442\u0438\u043b\u0438\u0441\u044c.\n\n\ud83d\udc41 \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435\n_________________\n\n\u26a0\ufe0f \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 Linux \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b Kubernetes-\u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432.\n\n\ud83d\udcac \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2022-0185, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u044f\u0434\u0440\u043e Linux, \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 Kubernetes \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u043d\u0430 \u0445\u043e\u0441\u0442\u0435. \u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0431\u0440\u0435\u0448\u044c \u043b\u0435\u0433\u043a\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0432 \u0441\u043a\u043e\u0440\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0434\u043e\u043b\u0436\u0435\u043d \u043f\u043e\u044f\u0432\u0438\u0442\u044c\u0441\u044f \u043a\u043e\u0434 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430.\n\n\ud83d\udc41 \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435\n_________________\n\n\ud83d\udcbb \u0412 StormWall \u043d\u0430\u0437\u0432\u0430\u043b\u0438 DDoS-\u0430\u0442\u0430\u043a\u0438 \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u0441\u0431\u043e\u0435\u0432 \u0431\u0430\u043d\u043a\u043e\u0432\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0432 \u0420\u043e\u0441\u0441\u0438\u0438 \u0432 2021 \u0433\u043e\u0434\u0443.\n\n\ud83d\udcac \u0425\u0430\u043a\u0435\u0440\u044b \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u043b\u0438 \u043c\u043e\u0449\u043d\u044b\u0435 DDoS-\u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0431\u0430\u043d\u043a\u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0432\u0441\u0435\u0433\u043e \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043e\u0442\u043c\u0435\u0447\u0430\u043b\u0438\u0441\u044c \u0441\u0431\u043e\u0438 \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 \u043a\u0440\u0435\u0434\u0438\u0442\u043d\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u0438 \u0438\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439, \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 StormWall.\n\n\ud83d\udc41 \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435\n_________________\n\n\ud83d\udccc \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0431\u0430\u043d\u043a\u0438 \u0443\u0441\u0438\u043b\u0438\u043b\u0438 \u0430\u043d\u0442\u0438\u0444\u0440\u043e\u0434-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043b\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0438\u0437-\u0437\u0430 \u043a\u0438\u0431\u0435\u0440\u043c\u043e\u0448\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\ud83d\udcac \u0420\u0430\u043d\u0435\u0435 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432 \u0441\u0444\u0435\u0440\u0435 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Positive Technologies \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u044b \u043a\u0440\u0435\u0434\u0438\u0442\u043d\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043e\u043d\u043b\u0430\u0439\u043d-\u0431\u0430\u043d\u043a\u0438\u043d\u0433\u043e\u043c, \u0441\u0442\u0430\u043d\u0443\u0442 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0433\u043b\u0430\u0432\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0439 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0432 \u0442\u0435\u043a\u0443\u0449\u0435\u043c \u0433\u043e\u0434\u0443. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432, \u0431\u0443\u0434\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043a\u0430\u043a \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439, \u0442\u0430\u043a \u0438 \u043f\u0440\u0438\u0435\u043c\u044b \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0438\u0438.\n\n\ud83d\udc41 \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435\n_________________\n\n\ud83d\udccc \u0420\u041a\u041d \u043e\u0448\u0442\u0440\u0430\u0444\u0443\u0435\u0442 \u0441\u043e\u0446\u0441\u0435\u0442\u0438 \u0437\u0430 \u0438\u0433\u043d\u043e\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0436\u0430\u043b\u043e\u0431 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\ud83d\udcac \u0412 \u041a\u043e\u0434\u0435\u043a\u0441 \u043e\u0431 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0430\u0432\u043e\u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u044f\u0445 \u0420\u0424 \u043c\u043e\u0433\u0443\u0442 \u0432\u043d\u0435\u0441\u0442\u0438 \u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043e \u043f\u0440\u0438\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0438 \u0441\u043e\u0446\u0441\u0435\u0442\u0435\u0439 \u043a \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0437\u0430 \u043d\u0435\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0435 \u0438 \u043d\u0435\u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u0436\u0430\u043b\u043e\u0431\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\ud83d\udc41 \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435\n_________________", "creation_timestamp": "2022-03-21T20:17:36.000000Z"}, {"uuid": "1f84822c-2091-471c-b5c9-f30603ea91d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "Telegram/TXmZ8EBGvdc4uufvEqu6hfgyjEc7K_gjD1Jpp8Uzvu6-KK0", "content": "", "creation_timestamp": "2023-03-23T09:18:19.000000Z"}, {"uuid": "3f1e4c43-8283-4498-9306-a4ebbeebf78c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/NeKaspersky/1716", "content": "\u0412 Filesystem Context API, \u044f\u0434\u0440\u0430 Linux, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2022-0185, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e root. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u0432\u0448\u0438\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0430\u0446\u0438\u044e \u0440\u0430\u0431\u043e\u0442\u044b \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430, \u043d\u0430 \u043f\u0440\u0438\u043c\u0435\u0440\u0435 Ubuntu 20.04 \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e. PoC \u043f\u043b\u0430\u043d\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0437\u0430\u043b\u0438\u0442\u044c \u043d\u0430 GitHub \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u043f\u043e\u0441\u043b\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u0444\u0438\u043a\u0441\u0430.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 legacy_parse_param() \u0432 VFS \u0434\u043b\u044f \u0444\u0430\u0439\u043b\u043e\u0432\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0449\u0438\u0445 Filesystem Context API. \u041f\u0435\u0440\u0435\u0434\u0430\u0447\u0430 \u0442\u0430\u043a\u043e\u0433\u043e \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 \u0432\u044b\u0437\u0432\u0430\u0435\u0442 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0439 \u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0439 \u0434\u043b\u044f \u0440\u0430\u0441\u0447\u0435\u0442\u0430 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u0412 \u043a\u043e\u0434\u0435 \u0438\u043c\u0435\u0435\u0442\u0441\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u044b\u0445\u043e\u0434\u0430 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0443 \u0431\u0443\u0444\u0435\u0440\u0430 if (len &gt; PAGE_SIZE - 2 - size), \u043d\u043e \u043f\u0440\u0438 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0438 size \u0431\u043e\u043b\u044c\u0448\u0435 4094 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u043d\u0438\u0436\u043d\u044e\u044e \u0433\u0440\u0430\u043d\u0438\u0446\u0443 (\u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u0438\u0435 4096 - 2 - 4095 \u043a unsigned int \u0432\u0435\u0440\u043d\u0435\u0442 2147483648).\n\n\u041f\u0440\u0438 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u0438 \u043a \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043e\u0431\u0440\u0430\u0437\u0443 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442  \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u044f\u0434\u0440\u0430, \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0437\u0430 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u044c\u044e \u043f\u0430\u043c\u044f\u0442\u0438. \u0414\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u043f\u0440\u0430\u0432 CAP_SYS_ADMIN. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0435\u0441\u043b\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 user namespaces, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u043e\u043c\u043e\u0447\u0438\u044f \u0432 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0435. User namespaces \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432\u043a\u043b\u044e\u0447\u0451\u043d\u0430 \u0432 Ubuntu \u0438 Fedora, \u043d\u043e \u043d\u0435 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0432 Debian \u0438 RHEL. \u041a\u0440\u043e\u043c\u0435 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u0431\u0435\u0433\u0430 \u0438\u0437 \u00ab\u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b\u00bb.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u044b \u044f\u0434\u0440\u0430 \u0441 Linux 5.1, \u0444\u0438\u043a\u0441\u044b \u0435\u0441\u0442\u044c \u0432 5.16.2, 5.15.16, 5.10.93, 5.4.173. \u0410\u043f\u0434\u0435\u0439\u0442\u044b \u0443\u0436\u0435 \u043f\u043e\u044f\u0432\u0438\u043b\u0438\u0441\u044c \u0432 RHEL, Debian, Fedora, Ubuntu, Arch Linux, Gentoo. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043e\u0431\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0443\u0442\u0438 \u0437\u0430\u0449\u0438\u0442\u044b \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u0443\u044e \u0438\u0437\u043e\u043b\u044f\u0446\u0438\u044e \u043c\u043e\u0436\u043d\u043e \u0432\u044b\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0432 0 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 sysctl \"user.max_user_namespaces\".\n@NeKaspersky", "creation_timestamp": "2022-01-23T17:17:15.000000Z"}, {"uuid": "74755364-481e-4d44-ae75-2fa5da1114fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "exploited", "source": "https://t.me/xakep_ru/11869", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044f\u0434\u0440\u0435 Linux \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u0431\u0435\u0433\u0430 \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 Kubernetes\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044f\u0434\u0440\u0435 Linux, \u0438\u043c\u0435\u044e\u0449\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2022-0185, \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u0431\u0435\u0433\u0430 \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 Kubernetes, \u0447\u0442\u043e \u0432 \u0438\u0442\u043e\u0433\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u0445\u043e\u0441\u0442-\u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\nhttps://xakep.ru/2022/01/26/cve-2022-0185/", "creation_timestamp": "2022-01-26T20:19:10.000000Z"}, {"uuid": "a27b2f05-51cd-478a-a0d2-3f67007f9115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:57.000000Z"}, {"uuid": "8ad9b807-6e38-495e-b71e-d9220841ee0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3553d037-288c-4e32-bd9a-0178723e6db0", "content": "", "creation_timestamp": "2026-02-02T12:26:30.996171Z"}, {"uuid": "83b17f53-9feb-4d37-b0d1-bd47092af622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1527", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-0185 POC and Docker and simple Analysis write up\nURL\uff1ahttps://github.com/chenaotian/CVE-2022-0185", "creation_timestamp": "2022-02-23T02:12:20.000000Z"}, {"uuid": "a78ae2ca-1ddd-4c9f-a672-0bf13068508e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/GithubRedTeam/1710", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-0185 analysis write up\nURL\uff1ahttps://github.com/chenaotian/CVE-2022-25636\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-03-24T07:09:53.000000Z"}, {"uuid": "4b084ba0-e3d0-4557-9f7f-1b6a38196daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1858", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-0185 exploit rewritten with pipe primitive\nURL\uff1ahttps://github.com/veritas501/CVE-2022-0185-PipeVersion\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-03T19:59:59.000000Z"}, {"uuid": "e9cb2148-4ca5-4236-8799-2c4690c4eec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1945", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-0185 exploit\nURL\uff1ahttps://github.com/featherL/CVE-2022-0185-exploit\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-04-14T11:10:29.000000Z"}, {"uuid": "6d50f572-3c10-40c7-9039-1c1196eb61e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1960", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-0185 solution\nURL\uff1ahttps://github.com/E1efuntik/CVE-2022-0185\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-04-15T21:08:47.000000Z"}, {"uuid": "a89b2f0b-bd5b-4738-bc57-bd62d9bca1af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/hack_room_channel/182", "content": "CVE-2022-0185 Container Escape PoC: \n\nhttps://github.com/Crusaders-of-Rust/CVE-2022-0185", "creation_timestamp": "2022-01-28T09:51:34.000000Z"}, {"uuid": "ff9b91b5-abc9-45ff-b375-c4a85d9c5e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5324", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (Jan 1-31)\n\nCVE-2021-44228 - Apache Log4j2\nCVE-2021-40444 - Microsoft MSHTML RCE\nCVE-2021-4034 - LPE vuln was found on polkit's pkexec utility\nCVE-2022-0185 - Linux Kernel Container Escape in Kubernetes\nCVE-2022-21907 - HTTP Protocol Stack RCE\nCVE-2022-21882 - Win32k Window Object Type Confusion\nCVE-2021-20038 - SonicWall SMA-100 Unauth RCE\nCVE-2021-45467 - CWP CentOS Web Panel preauth RCE\nCVE-2021-42392 - Unauth RCE in H2 Database Console\nCVE-2022-21658 - Vulnerability in Rust", "creation_timestamp": "2024-10-15T10:29:54.000000Z"}, {"uuid": "7b99ae42-aeda-4fe3-98c3-22b0f90d8281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5288", "content": "#exploit\nCVE-2021-4034:\nPwnKit: LPE Vulnerability in polkit\u2019s pkexec\nhttps://github.com/berdav/CVE-2021-4034\nhttps://github.com/Ayrx/CVE-2021-4034\nhttps://github.com/arthepsy/CVE-2021-4034\n\n2. CVE-2022-0185:\nLinux Kernel Can Allow Container Escape in Kubernetes\nhttps://github.com/Crusaders-of-Rust/CVE-2022-0185", "creation_timestamp": "2022-01-27T18:51:06.000000Z"}, {"uuid": "10a0c7dd-812b-4dab-a0b3-f5504b6bcd62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-08-21T18:10:02.000000Z"}, {"uuid": "4411c3d9-d3d1-4397-8430-37f6de258ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://gist.github.com/AyushyaChitransh/3b69f94e19b188ba41ee0c49a282e64c", "content": "", "creation_timestamp": "2025-03-13T20:14:03.000000Z"}, {"uuid": "a4370735-f962-4cb1-99f5-ad8f1cc5f4c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://gist.github.com/jjJohnP/57c593ba5458d2246cde112fac51af44", "content": "", "creation_timestamp": "2026-04-14T17:12:31.000000Z"}, {"uuid": "54c2f8af-9452-4af7-89d0-335592df3673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1597", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-0185 POC and Docker and simple Analysis write up\nURL\uff1ahttps://github.com/chenaotian/CVE-2022-0185", "creation_timestamp": "2022-03-07T04:01:02.000000Z"}, {"uuid": "76e95da0-01e0-4dd8-944e-b67afd988120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/arpsyndicate/257", "content": "#ExploitObserverAlert\n\nCVE-2022-0185\n\nDESCRIPTION: Exploit Observer has 56 entries related to CVE-2022-0185. A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.\n\nFIRST-EPSS: 0.000600000\nNVD-IS: 5.9\nNVD-ES: 2.5", "creation_timestamp": "2023-11-17T10:32:40.000000Z"}, {"uuid": "4770013d-626c-4089-bccf-a31d632874b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1427", "content": "kernel-linux-factory\n*\n\u0423\u0434\u043e\u0431\u043d\u043e \u0442\u0435\u043c, \u0447\u0442\u043e \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043a\u043e\u043c\u043f\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043b\u0438 \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0442\u044c \u0441\u0440\u0435\u0434\u0443, \u0433\u043b\u044f\u043d\u0443\u043b \u043a\u0430\u043a\u043e\u0435 \u044f\u0434\u0440\u043e, \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u043b \u0441\u043f\u043b\u043e\u0435\u0442, \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u043f\u043e \u043c\u043e\u0440\u0434\u0435 #root\n*\n\u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 exploits \u0434\u043b\u044f:\nCVE-2016-9793\n4-20-BPF-integer\nCVE-2017-5123\nCVE-2017-6074\nCVE-2017-7308\nCVE-2017-8890\nCVE-2017-11176\nCVE-2017-16995\nCVE-2017-1000112\nCVE-2018-5333\nCVE-2019-9213 &amp; CVE-2019-8956\nCVE-2019-15666\nCVE-2020-8835\nCVE-2020-27194\nCVE-2021-3156\nCVE-2021-31440\nCVE-2021-3490\nCVE-2021-22555\nCVE-2021-41073\nCVE-2021-4154\nCVE-2021-42008\nCVE-2021-43267\nCVE-2022-0185\nCVE-2022-0847\nCVE-2022-0995\nCVE-2022-1015\nCVE-2022-2588\nCVE-2022-2639\nCVE-2022-25636\nCVE-2022-27666\nCVE-2022-32250\nCVE-2022-34918\n\ndownload\n\n#linux #exploits #kernel", "creation_timestamp": "2023-03-23T06:30:43.000000Z"}, {"uuid": "f8d52783-3845-49de-861b-991e8f423ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/proxy_bar/572", "content": "\u042d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e ! \ud83c\udf83\ud83c\udf83\u2620\ufe0f\n1. \u0424\u043e\u0440\u043a \u0441\u0442\u0430\u0440\u043e\u0433\u043e \u0434\u043e\u0431\u0440\u043e\u0433\u043e Armitage \n2. CVE-2022-0185: Detecting and mitigating Linux Kernel vulnerability causing container escape \u0442\u0443\u0442\n3. CVE-2021-45467: CWP CentOS Web Panel \u2013 preauth RCE  \u0442\u0443\u0442 \n4. \u041d\u0443 \u0438 \u0441\u0430\u043c\u044b\u0439 \u0436\u0438\u0440 \u043d\u0430  \u0441\u0435\u0433\u043e\u0434\u043d\u044f - \u0432\u043e\u0440\u0443\u0435\u043c  \u0447\u0438\u0441\u0442\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438  \u043e\u0442 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 VeraCrypt (\u043f\u0440\u0438\u0435\u043c\u043d\u0438\u043a\u0430 TrueCrypt) \u043e\u0431\u0443\u0447\u0430\u044e\u0449\u0430\u044f GIF\u043a\u0430 \u0432 \u043f\u043e\u0434\u0430\u0440\u043e\u043a, \u0432\u0441\u0435 \u0442\u0443\u0442", "creation_timestamp": "2022-01-25T13:53:20.000000Z"}, {"uuid": "bd4efdab-74ff-4357-9dfc-e6e144186cb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1161", "content": "CVE-2022-0185 Container Escape PoC: \n\nhttps://github.com/Crusaders-of-Rust/CVE-2022-0185\n\nCVE-2021-4034 Privilege Escalation polkit pkexec PoC:\n\nhttps://github.com/berdav/CVE-2021-4034\n\n#git #exploit", "creation_timestamp": "2022-05-31T08:02:18.000000Z"}, {"uuid": "508b5d62-ee1d-4786-a05f-29b11abf1cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/cibsecurity/37329", "content": "\u203c CVE-2022-0185 \u203c\n\nA heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-11T20:34:53.000000Z"}, {"uuid": "e15b05ea-5bc4-418e-b4b5-a176953b6107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1660", "content": "#exploit\nCVE-2021-4034:\npwnkit - LPE in polkit's pkexec\nhttps://github.com/berdav/CVE-2021-4034\nhttps://github.com/Ayrx/CVE-2021-4034\nhttps://github.com/arthepsy/CVE-2021-4034\n\n2. CVE-2022-0185:\nLinux Kernel Can Allow Container Escape in Kubernetes\nhttps://github.com/Crusaders-of-Rust/CVE-2022-0185\n\n@BlueRedTeam", "creation_timestamp": "2022-01-27T09:32:28.000000Z"}, {"uuid": "0be05ec3-b1b7-404c-813d-8e3d2baa302c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "Telegram/cZHRCQIb7mVwEwPgUhRmgGXZDJpWRWiHGP56BhZb73fOTW_D", "content": "", "creation_timestamp": "2022-01-22T00:20:08.000000Z"}, {"uuid": "69aef3df-0640-4a59-91fd-1b4faa61d447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "Telegram/sqnoyhMgbPUh3mnvKBxV6UeQsxsEbONkpEW7ihdBQck5A2kE", "content": "", "creation_timestamp": "2022-02-01T01:45:11.000000Z"}, {"uuid": "43190208-00a4-453b-88f0-7a934ea2835a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3553d037-288c-4e32-bd9a-0178723e6db0", "content": "", "creation_timestamp": "2026-02-02T12:26:30.996171Z"}, {"uuid": "28d32d22-e40b-4bce-bfaa-40bc557ec63f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "published-proof-of-concept", "source": "https://t.me/noobhackersyoutube/1669", "content": "CVE-2022-0185 Container Escape PoC: \n\nhttps://github.com/Crusaders-of-Rust/CVE-2022-0185\n\nCVE-2021-4034 Privilege Escalation polkit pkexec PoC:\n\nhttps://github.com/berdav/CVE-2021-4034\n\n#git #exploit", "creation_timestamp": "2022-01-28T16:39:22.000000Z"}, {"uuid": "d289d069-6f13-4903-8fea-3b4efb4e4c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/BleepingComputer/11426", "content": "Linux kernel bug can let hackers escape Kubernetes containers\n\nA vulnerability affecting Linux kernel and tracked as CVE-2022-0185 can be used to escape Kubernetes containers, giving access to resources on the host system. [...]\n\nhttps://www.bleepingcomputer.com/news/security/linux-kernel-bug-can-let-hackers-escape-kubernetes-containers/", "creation_timestamp": "2022-01-25T18:48:20.000000Z"}]}