Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-0185

Опубликовано: 11 фев. 2022
Источник: debian
EPSS Низкий

Описание

A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.15.15-1package
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • Fixed by: https://git.kernel.org/linus/722d94847de29310e8aa03fcbdb41fc92c521756

  • https://www.openwall.com/lists/oss-security/2022/01/18/7

  • https://www.openwall.com/lists/oss-security/2022/01/25/14

  • https://www.willsroot.io/2022/01/cve-2022-0185.html

EPSS

Процентиль: 72%
0.00749
Низкий

Связанные уязвимости

CVSS3: 8.4
ubuntu
больше 3 лет назад

A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.

CVSS3: 7.8
redhat
больше 3 лет назад

A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.

CVSS3: 8.4
nvd
больше 3 лет назад

A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.

CVSS3: 8.4
msrc
больше 3 лет назад

Описание отсутствует

suse-cvrf
больше 3 лет назад

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)

EPSS

Процентиль: 72%
0.00749
Низкий