Bug 2040358 (CVE-2022-0185)
Summary: | CVE-2022-0185 kernel: fs_context: heap overflow in legacy parameter handling | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, adam.kaplan, adscvr, airlied, alciregi, andbartl, asavkov, bfoster, bhu, brdeoliv, bskeggs, chwhite, cmaiolin, cperry, crwood, ctoe, dhoward, dhowells, dvlasenk, esandeen, fhrbata, fpacheco, hdegoede, hkrzesin, jarod, jarodwilson, jburrell, jeremy, jfaracco, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jpoimboe, jshortt, jstancek, jthierry, jwboyer, kcarcia, kernel-maint, kernel-mgr, knoel, kpatch-maint, lgoncalv, linville, lzampier, masami256, mchehab, michal.skrivanek, mperina, mstowell, nalin, nmurray, nobody, pmatouse, proguski, ptalbert, qzhao, rdey, rhandlin, rkeshri, rvrbovsk, sbonazzo, scweaver, security-response-team, steved, swhiteho, vkumar, walters, williams, xzhou, ycote |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-05-11 15:15:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2040577, 2040578, 2040579, 2040580, 2040581, 2040582, 2040583, 2040584, 2040585, 2040586, 2040587, 2040588, 2040590, 2040591, 2040592, 2040593, 2040658, 2042052 | ||
Bug Blocks: | 2040359 |
Description
Marian Rehak
2022-01-13 14:45:48 UTC
Upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2 Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2042052] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0176 https://access.redhat.com/errata/RHSA-2022:0176 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0187 https://access.redhat.com/errata/RHSA-2022:0187 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0186 https://access.redhat.com/errata/RHSA-2022:0186 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0188 https://access.redhat.com/errata/RHSA-2022:0188 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0232 https://access.redhat.com/errata/RHSA-2022:0232 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0231 https://access.redhat.com/errata/RHSA-2022:0231 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:0540 https://access.redhat.com/errata/RHSA-2022:0540 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-0185 |