An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3131-1 | linux security update |
Debian DLA |
DLA-3173-1 | linux-5.10 security update |
Debian DSA |
DSA-5257-1 | linux security update |
Ubuntu USN |
USN-5791-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5791-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5791-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5792-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5792-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5815-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-5854-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5861-1 | Linux kernel (Dell300x) vulnerabilities |
Ubuntu USN |
USN-5862-1 | Linux kernel (Qualcomm Snapdragon) vulnerabilities |
Ubuntu USN |
USN-5865-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5877-1 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-5883-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-5924-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5975-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6007-1 | Linux kernel (GCP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T12:07:42.999Z
Reserved: 2022-09-05T00:00:00
Link: CVE-2022-39842
No data.
Status : Modified
Published: 2022-09-05T07:15:08.170
Modified: 2024-11-21T07:18:22.310
Link: CVE-2022-39842
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN