
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a potential integer overflow vulnerability (CVE-2022-49643) was identified in the ima_appraise_measurement function. The vulnerability was discovered when the ima-modsig feature is enabled, where a negative value passed to evm_verifyxattr() could trigger an integer overflow condition (Kernel Commit).
The vulnerability exists in the Linux kernel's Integrity Measurement Architecture (IMA) subsystem. Specifically, when ima-modsig is enabled, the rc parameter passed to evm_verifyxattr() function could be negative, potentially causing an integer overflow. This vulnerability is related to the module-style appended signatures implementation (Kernel Commit).
An integer overflow in the IMA subsystem could potentially lead to security verification bypass or system instability in Linux systems where ima-modsig is enabled (Kernel Commit).
The vulnerability has been patched by modifying the ima_appraise_measurement function to ensure that negative rc values are handled correctly by passing 0 instead of the negative value to evm_verifyxattr(). The fix was implemented in the Linux kernel through a patch that adds a check 'rc < 0 ? 0 : rc' (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."