CVE-2022-49180

Source
https://cve.org/CVERecord?id=CVE-2022-49180
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49180.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49180
Downstream
Related
Published
2025-02-26T01:55:32.590Z
Modified
2026-03-20T12:22:14.806255Z
Summary
LSM: general protection fault in legacy_parse_param
Details

In the Linux kernel, the following vulnerability has been resolved:

LSM: general protection fault in legacyparseparam

The usual LSM hook "bail on fail" scheme doesn't work for cases where a security module may return an error code indicating that it does not recognize an input. In this particular case Smack sees a mount option that it recognizes, and returns 0. A call to a BPF hook follows, which returns -ENOPARAM, which confuses the caller because Smack has processed its data.

The SELinux hook incorrectly returns 1 on success. There was a time when this was correct, however the current expectation is that it return 0 on success. This is repaired.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49180.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
da2441fdffbf7602da702aea5bd95ca4dc3d63fc
Fixed
ddcdda888e14ca451b3ee83d11b65b2a9c8e783b
Fixed
2784604c8c6fc523248f8f80a421c313a9d790b7
Fixed
f3f93a1aaafc3032e0a9655fb43deccfb3e953a3
Fixed
00fc07fa0b4a004711b6e1a944f0d2e46f7093b7
Fixed
cadae7c5e477aaafcba819b8e4a3d1c1a1503b62
Fixed
ecff30575b5ad0eda149aadad247b7f75411fd47

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49180.json"