First published: Mon Sep 05 2022(Updated: )
** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux Kernel | <5.19 | |
Linux Kernel | =5.19-rc1 | |
Linux Kernel | =5.19-rc2 | |
Linux Kernel | =5.19-rc3 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39842 is classified as a medium severity vulnerability due to the potential for integer overflow.
To mitigate CVE-2022-39842, upgrade to a kernel version that is 5.19 or higher, or apply the relevant patches provided by your distribution.
CVE-2022-39842 affects Linux kernel versions before 5.19, including specific release candidates and certain Debian Linux distributions.
CVE-2022-39842 is an integer overflow vulnerability in the pxa3xx_gcu_write function of the Linux kernel.
As of now, there are no publicly available exploits reported for CVE-2022-39842, but its nature could allow for potential future exploitation.