In the Linux kernel, the following vulnerability has been resolved:
vt: fix memory overlapping when deleting chars in the buffer
A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.
Fix this problem by using replacing the scr_memcpyw with scr_memmovew.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:rhel_eus:8.8 |
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-03-02T21:31:48.383Z
Updated: 2024-08-03T15:17:55.441Z
Reserved: 2024-02-25T13:44:28.314Z
Link: CVE-2022-48627
Vulnrichment
Updated: 2024-08-03T15:17:55.441Z
NVD
Status : Awaiting Analysis
Published: 2024-03-02T22:15:46.930
Modified: 2024-06-27T12:15:13.380
Link: CVE-2022-48627
Redhat