{"id":"CVE-2022-0185","details":"A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.","aliases":["A-213172369","PUB-A-213172369"],"modified":"2026-04-16T00:02:48.072729517Z","published":"2022-02-11T18:15:10.890Z","related":["ALSA-2022:0188","SUSE-SU-2022:0169-1","SUSE-SU-2022:0197-1","SUSE-SU-2022:0198-1","SUSE-SU-2022:0238-1","SUSE-SU-2022:0239-1","SUSE-SU-2022:0241-1","SUSE-SU-2022:0254-1","SUSE-SU-2022:0257-1","SUSE-SU-2022:0262-1","SUSE-SU-2022:0270-1","SUSE-SU-2022:0288-1","SUSE-SU-2022:0289-1","SUSE-SU-2022:0291-1","SUSE-SU-2022:0292-1","SUSE-SU-2022:0293-1","SUSE-SU-2022:0295-1","openSUSE-SU-2022:0169-1","openSUSE-SU-2022:0198-1","openSUSE-SU-2024:11775-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-0185"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220225-0003/"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2022/01/18/7"},{"type":"EVIDENCE","url":"https://github.com/Crusaders-of-Rust/CVE-2022-0185"},{"type":"EVIDENCE","url":"https://www.willsroot.io/2022/01/cve-2022-0185.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0185.json","unresolved_ranges":[{"events":[{"introduced":"5.1"},{"fixed":"5.4.173"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.93"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.16"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.16.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}