CVE-2022-49180

In the Linux kernel, the following vulnerability has been resolved: LSM: general protection fault in legacy_parse_param The usual LSM hook "bail on fail" scheme doesn't work for cases where a security module may return an error code indicating that it does not recognize an input. In this particular case Smack sees a mount option that it recognizes, and returns 0. A call to a BPF hook follows, which returns -ENOPARAM, which confuses the caller because Smack has processed its data. The SELinux hook incorrectly returns 1 on success. There was a time when this was correct, however the current expectation is that it return 0 on success. This is repaired.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 17:17

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/00fc07fa0b4a004711b6e1a944f0d2e46f7093b7 - () https://git.kernel.org/stable/c/00fc07fa0b4a004711b6e1a944f0d2e46f7093b7 - Patch
References () https://git.kernel.org/stable/c/2784604c8c6fc523248f8f80a421c313a9d790b7 - () https://git.kernel.org/stable/c/2784604c8c6fc523248f8f80a421c313a9d790b7 - Patch
References () https://git.kernel.org/stable/c/cadae7c5e477aaafcba819b8e4a3d1c1a1503b62 - () https://git.kernel.org/stable/c/cadae7c5e477aaafcba819b8e4a3d1c1a1503b62 - Patch
References () https://git.kernel.org/stable/c/ddcdda888e14ca451b3ee83d11b65b2a9c8e783b - () https://git.kernel.org/stable/c/ddcdda888e14ca451b3ee83d11b65b2a9c8e783b - Patch
References () https://git.kernel.org/stable/c/ecff30575b5ad0eda149aadad247b7f75411fd47 - () https://git.kernel.org/stable/c/ecff30575b5ad0eda149aadad247b7f75411fd47 - Patch
References () https://git.kernel.org/stable/c/f3f93a1aaafc3032e0a9655fb43deccfb3e953a3 - () https://git.kernel.org/stable/c/f3f93a1aaafc3032e0a9655fb43deccfb3e953a3 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LSM: error de protección general en legacy_parse_param El esquema habitual de gancho LSM "bail on fail" no funciona para los casos en los que un módulo de seguridad puede devolver un código de error que indica que no reconoce una entrada. En este caso particular, Smack ve una opción de montaje que reconoce y devuelve 0. Sigue una llamada a un gancho BPF, que devuelve -ENOPARAM, lo que confunde al llamador porque Smack ha procesado sus datos. El gancho SELinux devuelve incorrectamente 1 en caso de éxito. Hubo un momento en que esto era correcto, sin embargo, la expectativa actual es que devuelva 0 en caso de éxito. Esto se ha reparado.
First Time Linux
Linux linux Kernel

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-10-22 17:17


NVD link : CVE-2022-49180

Mitre link : CVE-2022-49180

CVE.ORG link : CVE-2022-49180


JSON object : View

Products Affected

linux

  • linux_kernel