CVE-2022-39842

CVSS V2 None CVSS V3 Medium 6.1
Description
** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.
Overview
  • CVE ID
  • CVE-2022-39842
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-09-05T07:15:08
  • Last Modified Date
  • 2023-03-01T16:31:15
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 5.19
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* 1 OR
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 6.1
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 1.8
  • Impact Score
  • 4.2
History
Created Old Value New Value Data Type Notes
2022-09-05 08:00:29 Added to TrackCVE
2022-12-19 11:14:24 2022-12-19T10:15:10 CVE Modified Date updated
2022-12-19 11:14:24 Analyzed Modified Vulnerability Status updated
2022-12-19 11:14:25 An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. ** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen. Description updated
2022-12-19 11:14:26 References updated
2022-12-29 11:14:44 Modified Undergoing Analysis Vulnerability Status updated
2023-03-01 17:14:42 2023-03-01T16:31:15 CVE Modified Date updated
2023-03-01 17:14:42 Undergoing Analysis Analyzed Vulnerability Status updated