Lucene search

K
vulnrichmentRedhatVULNRICHMENT:CVE-2022-0185
HistoryFeb 11, 2022 - 5:40 p.m.

CVE-2022-0185

2022-02-1117:40:57
CWE-190
redhat
github.com
5
heap-based buffer overflow
linux kernel
filesystem context
privilege escalation

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

62.1%

SSVC

Exploitation

active

Automatable

no

Technical Impact

total

A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
    ],
    "vendor": "linux",
    "product": "linux_kernel",
    "versions": [
      {
        "status": "affected",
        "version": "8.4"
      }
    ],
    "defaultStatus": "unknown"
  }
]