A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://unit42.paloaltonetworks.com/cve-2022-0492-cgroups/
https://www.debian.org/security/2022/dsa-5096
https://www.debian.org/security/2022/dsa-5095
https://security.netapp.com/advisory/ntap-20220419-0002/
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://bugzilla.redhat.com/show_bug.cgi?id=2051505
http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html