First published: Thu Jan 13 2022(Updated: )
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.12.2.rt7.143.el8_5 | 0:4.18.0-348.12.2.rt7.143.el8_5 |
redhat/kernel | <0:4.18.0-348.12.2.el8_5 | 0:4.18.0-348.12.2.el8_5 |
redhat/kernel-rt | <0:4.18.0-305.34.2.rt7.107.el8_4 | 0:4.18.0-305.34.2.rt7.107.el8_4 |
redhat/kernel | <0:4.18.0-305.34.2.el8_4 | 0:4.18.0-305.34.2.el8_4 |
Linux Kernel | >=5.1<5.4.173 | |
Linux Kernel | >=5.5<5.10.93 | |
Linux Kernel | >=5.11<5.15.16 | |
Linux Kernel | >=5.16<5.16.2 | |
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
IBM Planning Analytics Cloud | <=4.0 |
On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0: # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf On containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Disable unprivileged user namespaces: sysctl -w kernel.unprivileged_userns_clone=0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2022-0185 has been classified with a high severity rating due to the potential for heap-based buffer overflow which can lead to arbitrary code execution.
To address CVE-2022-0185, update your Linux kernel to versions 4.18.0-348.12.2.rt7.143.el8_5, 4.18.0-348.12.2.el8_5, or any subsequent unreleased patches.
CVE-2022-0185 affects various Linux kernel versions and specific Red Hat packages such as kernel-rt and kernel for versions up to 4.18.0-348.12.2.
An unprivileged user may exploit CVE-2022-0185 if unprivileged user namespaces are enabled, allowing for unauthorized access to the affected systems.
Exploitation of CVE-2022-0185 can be relatively straightforward, as it may allow adversaries to execute arbitrary code with low complexity.