ghsa-r6pw-rw8p-5cr9
Vulnerability from github
Published
2025-06-18 12:30
Modified
2025-06-18 12:30
Details

In the Linux kernel, the following vulnerability has been resolved:

vt: Clear selection before changing the font

When changing the console font with ioctl(KDFONTOP) the new font size can be bigger than the previous font. A previous selection may thus now be outside of the new screen size and thus trigger out-of-bounds accesses to graphics memory if the selection is removed in vc_do_resize().

Prevent such out-of-memory accesses by dropping the selection before the various con_font_set() console handlers are called.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2022-49948"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-06-18T11:15:21Z",
    "severity": null
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.",
  "id": "GHSA-r6pw-rw8p-5cr9",
  "modified": "2025-06-18T12:30:36Z",
  "published": "2025-06-18T12:30:36Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49948"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…