645
VMScore

CVE-2022-0185

Published: 11/02/2022 Updated: 26/06/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.4 | Impact Score: 5.9 | Exploitability Score: 2.5
VMScore: 645
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

It exists that the BPF verifier in the Linux kernel did not properly restrict pointer types in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-23222) ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

netapp h410c_firmware -

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h300e_firmware -

netapp h500e_firmware -

netapp h700e_firmware -

netapp h410s_firmware -

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2021-4155 Kirill Tkhai discovered a data leak in the way the XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for a size increase of files with unaligned size A local attacker can tak ...
Synopsis Moderate: Red Hat Advanced Cluster Management 2211 security updates and bug fixes Type/Severity Security Advisory: Moderate Topic Red Hat Advanced Cluster Management for Kubernetes 2211 General Availability release images, which provide one or more container updates and bug fixesRed Hat Product Security has rated this update as ...
Synopsis Moderate: OpenShift Container Platform 4742 security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4742 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Container Platfo ...
Synopsis Important: Red Hat Virtualization Host security update [ovirt-4410-1] Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for redhat-release-virtualization-host and redhat-virtualization-host is now avail ...
Synopsis Important: Red Hat Advanced Cluster Management 236 security updates and bug fixes Type/Severity Security Advisory: Important Topic Red Hat Advanced Cluster Management for Kubernetes 236 General Availabilityrelease images, which provide security updates and bug fixes Description Red Hat Advanced Cluster Management for Kubernete ...
Synopsis Important: Red Hat Advanced Cluster Management 242 security updates and bug fixes Type/Severity Security Advisory: Important Topic Red Hat Advanced Cluster Management for Kubernetes 242 General Availabilityrelease images This update provides security fixes, fixes bugs, and updates the container imagesRed Hat Product Security ha ...
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that do ...
A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them (CVE-2021-4155) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in ...
A denial of service flaw for virtual machine guests in the Linux kernel's Xen hypervisor subsystem was found in the way users call some interrupts with high frequency from one of the guestsA local user could use this flaw to starve the resources resulting in a denial of service (CVE-2021-28711) A denial of service flaw for virtual machine guests ...
A denial of service flaw for virtual machine guests in the Linux kernel's Xen hypervisor subsystem was found in the way users call some interrupts with high frequency from one of the guestsA local user could use this flaw to starve the resources resulting in a denial of service (CVE-2021-28711) A denial of service flaw for virtual machine guests ...
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that do ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Linux kernel: Heap buffer overflow in fs_contextc since version 51 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...

Github Repositories

Awesome resources about Security in Kubernetes

Kubernetes Security Checklist Table of Contents Kubernetes Infrastructure Kubernetes Security Features Kubernetes Authorization - RBAC Kubernetes Pod Security Kubernetes Secrets Kubernetes Networking Kubernetes Supply Chain Security Common attacks Kubernetes Security Tools Kubernetes Security Guides Further reading Collaborate Kubernetes Infrastructure ✅ Limiting acces

CVE-2022-0185 exploit rewritten with pipe primitive

CVE-2022-0185 pipe version Using pipe-primitive to exploit CVE-2022-0185, so no kaslr leak nor smap smep ktpi bypass is needed :) (Q: What is pipe-primitive? A: githubcom/veritas501/pipe-primitive)

An eBPF module created to prevent docker escape attacks by leveraging the unshare command

Container Escape Prevention using eBPF We have conducted a case study on two major CVE exploits on Linux systems: CVE-2022-0185 CVE-2022-0492 Both of the exploits depend on using the unshare command to gain unfair access to a root level namespace and to escape a docker container We first performed these exploits on our systems and then created a Linux security module using e

CVE-Errata-Tool This set of tools help Red Hat TAMs gather information about CVEs, Erratas, etc It calls accessredhatcom/hydra/rest/securitydata API and prints results in the terminal unresolved_cvespy Provides information about CVEs fulfilling search criteria Those include CVE number, release date, severity, URL, description, mitigation strategy, affected produc

CVE-2022-0185 This repo contains demo exploits for CVE-2022-0185 There are two versions here The non-kctf version (fuse version) specifically targets Ubuntu with kernel version 5110-44 It does not directly return a root shell, but makes /bin/bash suid, which will lead to trivial privilege escalation Adjusting the single_start and modprobe_path offsets should allow it to

My CVE, bug bounty, and general cybersec relevant reading list and notes Misc Links National Vulnerability Database: here NVD CVE search: here NVD data feeds listing: here CVE details CVSS distribution listing: here Mitre CVE search: here Pentesterland list of bug bounty writeups: here JFrog security research blogroll: here vuldb listing: here 2022 March Title

Container running cve-2022-0185 crash POC This is a docker container that runs the crash POC from wwwwillsrootio/2022/01/cve-2022-0185html The container runs unprivileged as UID 65534 You can also use docker run -u or set a security context with RunAsUser additionally, all should yield the same result Run it To be clear, if you're vulnerable that will crash

Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques

Linux Kernel Learning This repository is to keep track of my steps learning about the Linux Kernel and Linux Kernel exploitation techniques I might be adding random notes on various aspects of the Linux kernel, exploits of known vulnerabilities that I write myself as a means of learning (don't expect breakthrough research), tricks that I learn along the way, or just anyth

CVE-2022-0185

CVE-2022-0185 This repo contains demo exploits for CVE-2022-0185 There are two versions here The non-kctf version (fuse version) specifically targets Ubuntu with kernel version 5110-44 It does not directly return a root shell, but makes /bin/bash suid, which will lead to trivial privilege escalation Adjusting the single_start and modprobe_path offsets should allow it to

CVE-2022-0185 POC and Docker and Analysis write up

CVE-2022-0185 linux 内核提权(逃逸) [toc] 漏洞简介 漏洞编号: CVE-2022-0185 漏洞评分: 漏洞产品: linux kernel - fsconfig syscall 影响范围: linux kernel 51-rc1 ~ 5162 利用条件: linux 本地; 具有CAP_SYS_ADMIN cap权限(可以unshare 直接获得,等于无限制) 利用效果: 本地提权;容器逃逸 源码获取: git clone git://kernelubunt

Personal goals/study guide

pwn-gym Personal goals/study guide Cover all linux kernel Finish LDD3: lwnnet/Kernel/LDD3/ sk_buff: blogcsdnnet/YuZhiHui_No1/article/details/38690015 blogcsdnnet/yuzhihui_no1/article/details/38737615 blogcsdnnet/YuZhiHui_No1/article/details/38827603 blogcsdnnet/YuZhiHui_No1/article/details/38965069 setsockopt page spray: htt

Ensure Kubernetes reliability with Datree for misconfigurations, Lens for cluster management, Monokle, and Kubesphere for YAML templates and multi-cluster setups. Kubespace secures clusters, Validkube validates YAML, and Portainer manages containers. Optimize costs effortlessly with kubecost.

MANAGE, SECURE, VALIDATE, DEBUG, MONITOR, HARDENING AND PREVENT MISCONFIGURATION OF KUBERNETES Table of Contents Kubernetes Infrastructure Kubernetes Security Features Kubernetes Authorization - RBAC Kubernetes Pod Security Kubernetes Secrets Kubernetes Networking Kubernetes Supply Chain Security Common Attacks Kubernetes Security Tools Kubernetes Security Guides Further Read

Recent Articles

'Now' would be the right time to patch Ubuntu container hosts and ditch 21.04 thanks to heap buffer overflow bug
The Register • Liam Proven in Prague • 20 Jan 2022

Get our weekly newsletter Red Hat agrees

The CVE-2022-0185 vulnerability in Ubuntu is severe enough that Red Hat is also advising immediate patching. The flaw allows a process inside a Linux user namespace to escape, which means it potentially affects any machine running containers. If you're not running any containers, you can just disable the user-namespace functionality – both companies' vulnerability descriptions describe how to do that on their respective distros. It affects RHEL (and derivatives) as well as Ubuntu 20.04, 21.04 ...

Chinese snoops use F5, ConnectWise bugs to sell access into top US, UK networks
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Crew may well be working under contract for Beijing

Chinese spies exploited a couple of critical-severity bugs in F5 and ConnectWise equipment earlier this year to sell access to compromised US defense organizations, UK government agencies, and hundreds of other entities, according to Mandiant. The Google-owned threat hunters said they assess, "with moderate confidence," that a crew they track as UNC5174 was behind the exploitation of CVE-2023-46747, a 9.8-out-of-10-CVSS-rated remote code execution bug in the F5 BIG-IP Traffic Management User Int...