ghsa-r6pw-rw8p-5cr9
Vulnerability from github
Published
2025-06-18 12:30
Modified
2025-06-18 12:30
VLAI Severity ?
Details
In the Linux kernel, the following vulnerability has been resolved:
vt: Clear selection before changing the font
When changing the console font with ioctl(KDFONTOP) the new font size can be bigger than the previous font. A previous selection may thus now be outside of the new screen size and thus trigger out-of-bounds accesses to graphics memory if the selection is removed in vc_do_resize().
Prevent such out-of-memory accesses by dropping the selection before the various con_font_set() console handlers are called.
{ "affected": [], "aliases": [ "CVE-2022-49948" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-06-18T11:15:21Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.", "id": "GHSA-r6pw-rw8p-5cr9", "modified": "2025-06-18T12:30:36Z", "published": "2025-06-18T12:30:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49948" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…