In the Linux kernel, the following vulnerability has been resolved:
ima: Fix a potential integer overflow in imaappraisemeasurement
When the ima-modsig is enabled, the rc passed to evm_verifyxattr() may be negative, which may cause the integer overflow problem.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49643.json"
}[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"170390553535545595851340899648475458712",
"29650309176965573622569603846816657960",
"328611875651370284395429554275481625556",
"12727027447906652431843572849688744994"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49643-0fdda8a4",
"target": {
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@831e190175f10652be93b08436cc7bf2e62e4bb6"
},
{
"digest": {
"length": 2332.0,
"function_hash": "187112478708033315655928126230138973677"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49643-6fdd5596",
"target": {
"function": "ima_appraise_measurement",
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@388f3df7c3c8b7f2a32b9ae0a9b2f9f6ad3b1b77"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"170390553535545595851340899648475458712",
"29650309176965573622569603846816657960",
"328611875651370284395429554275481625556",
"12727027447906652431843572849688744994"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49643-74577ff7",
"target": {
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@640cea4c2839a821adfbb703b590a5928abe9286"
},
{
"digest": {
"length": 2477.0,
"function_hash": "49690496603317754620127680010810163005"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49643-be0633f1",
"target": {
"function": "ima_appraise_measurement",
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8d5d81940938b5f6c0f495ca9538e7740416f30"
},
{
"digest": {
"length": 2586.0,
"function_hash": "30053839737984986011543875416445496141"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49643-c46c785d",
"target": {
"function": "ima_appraise_measurement",
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d2ee2cfc4aa85ff6a2a3b198a3a524ec54e3d999"
},
{
"digest": {
"length": 2477.0,
"function_hash": "49690496603317754620127680010810163005"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49643-dec7a3f0",
"target": {
"function": "ima_appraise_measurement",
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@640cea4c2839a821adfbb703b590a5928abe9286"
},
{
"digest": {
"length": 2346.0,
"function_hash": "308564076054093928682009563193643195726"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49643-ec605633",
"target": {
"function": "ima_appraise_measurement",
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@831e190175f10652be93b08436cc7bf2e62e4bb6"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"170390553535545595851340899648475458712",
"29650309176965573622569603846816657960",
"328611875651370284395429554275481625556",
"12727027447906652431843572849688744994"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49643-f0826850",
"target": {
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@388f3df7c3c8b7f2a32b9ae0a9b2f9f6ad3b1b77"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"170390553535545595851340899648475458712",
"29650309176965573622569603846816657960",
"328611875651370284395429554275481625556",
"12727027447906652431843572849688744994"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49643-f314a371",
"target": {
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d2ee2cfc4aa85ff6a2a3b198a3a524ec54e3d999"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"170390553535545595851340899648475458712",
"29650309176965573622569603846816657960",
"328611875651370284395429554275481625556",
"12727027447906652431843572849688744994"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49643-fe816438",
"target": {
"file": "security/integrity/ima/ima_appraise.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8d5d81940938b5f6c0f495ca9538e7740416f30"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49643.json"