vulnerability
Ubuntu: (CVE-2022-49444): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:S/C:C/I:N/A:C) | Feb 26, 2025 | Mar 19, 2025 | Oct 23, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
module: fix [e_shstrndx].sh_size=0 OOB access
It is trivial to craft a module to trigger OOB access in this line:
if (info->secstrings[strhdr->sh_size - 1] != '\0') {
BUG: unable to handle page fault for address: ffffc90000aa0fff
PGD 100000067 P4D 100000067 PUD 100066067 PMD 10436f067 PTE 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 7 PID: 1215 Comm: insmod Not tainted 5.18.0-rc5-00007-g9bf578647087-dirty #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
RIP: 0010:load_module+0x19b/0x2391
[rebased patch onto modules-next]
Solutions
References
- CVE-2022-49444
- https://attackerkb.com/topics/CVE-2022-49444
- CWE-125
- URL-https://git.kernel.org/linus/391e982bfa632b8315235d8be9c0a81374c6a19c
- URL-https://git.kernel.org/stable/c/09cb6663618a74fe5572a4931ecbf098832e79ec
- URL-https://git.kernel.org/stable/c/391e982bfa632b8315235d8be9c0a81374c6a19c
- URL-https://git.kernel.org/stable/c/45a76414b6d8b8b39c23fea53b9d20e831ae72a0
- URL-https://git.kernel.org/stable/c/921630e2e5124a04158129a8f22f4b425e61a858
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49444
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.