{"uuid": "cf7160e6-2f2c-4b4f-8f19-98dc2ac9371f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49289", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5431", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49289\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nuaccess: fix integer overflow on access_ok()\n\nThree architectures check the end of a user access against the\naddress limit without taking a possible overflow into account.\nPassing a negative length or another overflow in here returns\nsuccess when it should not.\n\nUse the most common correct implementation here, which optimizes\nfor a constant 'size' argument, and turns the common case into a\nsingle comparison.\n\ud83d\udccf Published: 2025-02-26T01:56:27.026Z\n\ud83d\udccf Modified: 2025-02-26T01:56:27.026Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e65d28d4e9bf90a35ba79c06661a572a38391dec\n2. https://git.kernel.org/stable/c/99801e2f457824955da4aadaa035913a6dede03a\n3. https://git.kernel.org/stable/c/a1ad747fc1a0e06d1bf26b996ee8a56b5c8d02d8\n4. https://git.kernel.org/stable/c/222ca305c9fd39e5ed8104da25c09b2b79a516a8", "creation_timestamp": "2025-02-26T02:23:32.000000Z"}