Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2022-48627
HistoryMar 02, 2024 - 9:31 p.m.

CVE-2022-48627 vt: fix memory overlapping when deleting chars in the buffer

2024-03-0221:31:48
Linux
github.com
6
linux kernel
vulnerability fix
memory overlapping.

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

vt: fix memory overlapping when deleting chars in the buffer

A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.

Fix this problem by using replacing the scr_memcpyw with scr_memmovew.

CNA Affected

[
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "81732c3b2fed",
        "lessThan": "c8686c014b5e",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "81732c3b2fed",
        "lessThan": "815be99d934e",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "81732c3b2fed",
        "lessThan": "bfee93c9a6c3",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "81732c3b2fed",
        "lessThan": "57964a571025",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "81732c3b2fed",
        "lessThan": "14d2cc21ca62",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "81732c3b2fed",
        "lessThan": "39cdb68c64d8",
        "versionType": "git"
      }
    ],
    "programFiles": [
      "drivers/tty/vt/vt.c"
    ],
    "defaultStatus": "unaffected"
  },
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "3.7"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "3.7",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "4.19.312",
        "versionType": "custom",
        "lessThanOrEqual": "4.19.*"
      },
      {
        "status": "unaffected",
        "version": "5.4.274",
        "versionType": "custom",
        "lessThanOrEqual": "5.4.*"
      },
      {
        "status": "unaffected",
        "version": "5.10.132",
        "versionType": "custom",
        "lessThanOrEqual": "5.10.*"
      },
      {
        "status": "unaffected",
        "version": "5.15.56",
        "versionType": "custom",
        "lessThanOrEqual": "5.15.*"
      },
      {
        "status": "unaffected",
        "version": "5.18.13",
        "versionType": "custom",
        "lessThanOrEqual": "5.18.*"
      },
      {
        "status": "unaffected",
        "version": "5.19",
        "versionType": "original_commit_for_fix",
        "lessThanOrEqual": "*"
      }
    ],
    "programFiles": [
      "drivers/tty/vt/vt.c"
    ],
    "defaultStatus": "affected"
  }
]

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial