⚠ Actively exploited
Added to CISA KEV on 2024-08-21. Federal agencies required to patch by 2024-09-11. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable..
CVE-2022-0185 — Integer Overflow or Wraparound in Kernel
Severity
8.4HIGHNVD
OSV6.5CISA7.8
EPSS
3.3%
top 12.68%
CISA KEV
KEV
Added 2024-08-21
Due 2024-09-11
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 11
KEV addedAug 21
KEV dueSep 11
Latest updateDec 12
CISA Required Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Description
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.5 | Impact: 5.9
Affected Packages8 packages
Patches
🔴Vulnerability Details
5OSV▶
CVE-2022-0185: A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel ver↗2022-02-11
📋Vendor Advisories
9Microsoft▶
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivile↗2022-02-08
🕵️Threat Intelligence
7Unit42
▶
Unit42
▶
Tenable▶
Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat↗2025-02-14