We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50222

tty: vt: initialize unicode screen buffer



Description

In the Linux kernel, the following vulnerability has been resolved: tty: vt: initialize unicode screen buffer syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read immediately after resize operation. Initialize buffer using kzalloc(). ---------- #include <fcntl.h> #include <unistd.h> #include <sys/ioctl.h> #include <linux/fb.h> int main(int argc, char *argv[]) { struct fb_var_screeninfo var = { }; const int fb_fd = open("/dev/fb0", 3); ioctl(fb_fd, FBIOGET_VSCREENINFO, &var); var.yres = 0x21; ioctl(fb_fd, FBIOPUT_VSCREENINFO, &var); return read(open("/dev/vcsu", O_RDONLY), &var, sizeof(var)) == -1; } ----------

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e02fa87e572bb7d90dcdbce9c0f519f1eb992e96
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before cc9e874dace0c89ae535230c7da19b764746811e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5c6c65681f39bf71bc72ed589dec3b8b20e75cac
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 446f123aa6021e5f75a20789f05ff3f7ae51a42f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 777a462e1ae50a01fc4a871efa8e34d596a1e17d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e0ef23e9b0ad18b9fd3741b0f1ad2282e4a18def
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before af77c56aa35325daa2bc2bed5c2ebf169be61b86
affected

Default status
affected

4.19.256
unaffected

5.4.211
unaffected

5.10.137
unaffected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/e02fa87e572bb7d90dcdbce9c0f519f1eb992e96

git.kernel.org/...c/cc9e874dace0c89ae535230c7da19b764746811e

git.kernel.org/...c/5c6c65681f39bf71bc72ed589dec3b8b20e75cac

git.kernel.org/...c/446f123aa6021e5f75a20789f05ff3f7ae51a42f

git.kernel.org/...c/777a462e1ae50a01fc4a871efa8e34d596a1e17d

git.kernel.org/...c/e0ef23e9b0ad18b9fd3741b0f1ad2282e4a18def

git.kernel.org/...c/af77c56aa35325daa2bc2bed5c2ebf169be61b86

cve.org (CVE-2022-50222)

nvd.nist.gov (CVE-2022-50222)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50222

Support options

Helpdesk Chat, Email, Knowledgebase