Vulnerability Details : CVE-2022-48627
In the Linux kernel, the following vulnerability has been resolved:
vt: fix memory overlapping when deleting chars in the buffer
A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.
Fix this problem by using replacing the scr_memcpyw with scr_memmovew.
Products affected by CVE-2022-48627
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-48627
0.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-48627
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-10-29 |
CWE ids for CVE-2022-48627
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-48627
-
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
vt: fix memory overlapping when deleting chars in the buffer - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
[SECURITY] [DLA 3840-1] linux security updateMailing List
-
https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29
vt: fix memory overlapping when deleting chars in the buffer - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
vt: fix memory overlapping when deleting chars in the buffer - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
vt: fix memory overlapping when deleting chars in the buffer - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c
vt: fix memory overlapping when deleting chars in the buffer - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
vt: fix memory overlapping when deleting chars in the buffer - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to