CVE-2022-50159

In the Linux kernel, the following vulnerability has been resolved: of: check previous kernel's ima-kexec-buffer against memory bounds Presently ima_get_kexec_buffer() doesn't check if the previous kernel's ima-kexec-buffer lies outside the addressable memory range. This can result in a kernel panic if the new kernel is booted with 'mem=X' arg and the ima-kexec-buffer was allocated beyond that range by the previous kernel. The panic is usually of the form below: $ sudo kexec --initrd initrd vmlinux --append='mem=16G' <snip> BUG: Unable to handle kernel data access on read at 0xc000c01fff7f0000 Faulting instruction address: 0xc000000000837974 Oops: Kernel access of bad area, sig: 11 [#1] <snip> NIP [c000000000837974] ima_restore_measurement_list+0x94/0x6c0 LR [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160 Call Trace: [c00000000371fa80] [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160 [c00000000371fb00] [c0000000020512c4] ima_init+0x80/0x108 [c00000000371fb70] [c0000000020514dc] init_ima+0x4c/0x120 [c00000000371fbf0] [c000000000012240] do_one_initcall+0x60/0x2c0 [c00000000371fcc0] [c000000002004ad0] kernel_init_freeable+0x344/0x3ec [c00000000371fda0] [c0000000000128a4] kernel_init+0x34/0x1b0 [c00000000371fe10] [c00000000000ce64] ret_from_kernel_thread+0x5c/0x64 Instruction dump: f92100b8 f92100c0 90e10090 910100a0 4182050c 282a0017 3bc00000 40810330 7c0802a6 fb610198 7c9b2378 f80101d0 <a1240000> 2c090001 40820614 e9240010 ---[ end trace 0000000000000000 ]--- Fix this issue by checking returned PFN range of previous kernel's ima-kexec-buffer with page_is_ram() to ensure correct memory bounds.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Nov 2025, 15:14

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1b2263d6c86fca8f30e18231778393bfc287bb27 - () https://git.kernel.org/stable/c/1b2263d6c86fca8f30e18231778393bfc287bb27 - Patch
References () https://git.kernel.org/stable/c/beb5bba5dd132650c073f815c685c60c3e5b783b - () https://git.kernel.org/stable/c/beb5bba5dd132650c073f815c685c60c3e5b783b - Patch
References () https://git.kernel.org/stable/c/cbf9c4b9617b6767886a913705ca14b7600c77db - () https://git.kernel.org/stable/c/cbf9c4b9617b6767886a913705ca14b7600c77db - Patch
References () https://git.kernel.org/stable/c/dc3b8525f83ac6bbc885bb24bbb8a76f4622200e - () https://git.kernel.org/stable/c/dc3b8525f83ac6bbc885bb24bbb8a76f4622200e - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2025-06-18 11:15

Updated : 2025-11-25 15:14


NVD link : CVE-2022-50159

Mitre link : CVE-2022-50159

CVE.ORG link : CVE-2022-50159


JSON object : View

Products Affected

linux

  • linux_kernel