In the Linux kernel, the following vulnerability has been resolved:
vt: fix memory overlapping when deleting chars in the buffer
A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.
Fix this problem by using replacing the scr_memcpyw with scr_memmovew.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
29 Apr 2025, 16:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Linux linux Kernel Debian debian Linux Linux |
|
CWE | CWE-787 | |
CPE | cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265 - Patch | |
References | () https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc - Patch | |
References | () https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244 - Patch | |
References | () https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c - Patch | |
References | () https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926 - Patch | |
References | () https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List |
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265 - | |
References | () https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc - | |
References | () https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244 - | |
References | () https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c - | |
References | () https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926 - | |
References | () https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29 - |
04 Nov 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Oct 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Apr 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Mar 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-02 22:15
Updated : 2025-04-29 16:51
NVD link : CVE-2022-48627
Mitre link : CVE-2022-48627
CVE.ORG link : CVE-2022-48627
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write