{"uuid": "76e95da0-01e0-4dd8-944e-b67afd988120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0185", "type": "seen", "source": "https://t.me/arpsyndicate/257", "content": "#ExploitObserverAlert\n\nCVE-2022-0185\n\nDESCRIPTION: Exploit Observer has 56 entries related to CVE-2022-0185. A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.\n\nFIRST-EPSS: 0.000600000\nNVD-IS: 5.9\nNVD-ES: 2.5", "creation_timestamp": "2023-11-17T10:32:40.000000Z"}