In the Linux kernel, the following vulnerability has been resolved:
LSM: general protection fault in legacy_parse_param
The usual LSM hook "bail on fail" scheme doesn't work for cases where
a security module may return an error code indicating that it does not
recognize an input. In this particular case Smack sees a mount option
that it recognizes, and returns 0. A call to a BPF hook follows, which
returns -ENOPARAM, which confuses the caller because Smack has processed
its data.
The SELinux hook incorrectly returns 1 on success. There was a time
when this was correct, however the current expectation is that it
return 0 on success. This is repaired.
References
Configurations
Configuration 1 (hide)
|
History
22 Oct 2025, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/00fc07fa0b4a004711b6e1a944f0d2e46f7093b7 - Patch | |
| References | () https://git.kernel.org/stable/c/2784604c8c6fc523248f8f80a421c313a9d790b7 - Patch | |
| References | () https://git.kernel.org/stable/c/cadae7c5e477aaafcba819b8e4a3d1c1a1503b62 - Patch | |
| References | () https://git.kernel.org/stable/c/ddcdda888e14ca451b3ee83d11b65b2a9c8e783b - Patch | |
| References | () https://git.kernel.org/stable/c/ecff30575b5ad0eda149aadad247b7f75411fd47 - Patch | |
| References | () https://git.kernel.org/stable/c/f3f93a1aaafc3032e0a9655fb43deccfb3e953a3 - Patch | |
| Summary |
|
|
| First Time |
Linux
Linux linux Kernel |
26 Feb 2025, 07:00
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-26 07:00
Updated : 2025-10-22 17:17
NVD link : CVE-2022-49180
Mitre link : CVE-2022-49180
CVE.ORG link : CVE-2022-49180
JSON object : View
Products Affected
linux
- linux_kernel
CWE
