CVE-2022-49948 (GCVE-0-2022-49948)
Vulnerability from cvelistv5
Published
2025-06-18 11:00
Modified
2025-12-23 13:26
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: vt: Clear selection before changing the font When changing the console font with ioctl(KDFONTOP) the new font size can be bigger than the previous font. A previous selection may thus now be outside of the new screen size and thus trigger out-of-bounds accesses to graphics memory if the selection is removed in vc_do_resize(). Prevent such out-of-memory accesses by dropping the selection before the various con_font_set() console handlers are called.
Impacted products
Vendor Product Version
Linux Linux Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: 009e39ae44f4191188aeb6dfbf661b771dbbe515
Version: e60f8fcce05042e8f8cea25ee81fecc1222114cf
Version: 5812a9bc9d68a82c2cc839f88e6f7a05093ab39d
Version: 863ad19fd654c485e3beec3575c4d74a1e74369e
Version: dbc3fd44f957a39407e889287bf61fa0ef3ecc14
Version: 0b2a0a58ad22f9d6dfc641bc5ec46057493f22a5
Version: 9f2d48f0745f921040df91bfe8fa7f0339cd7497
Version: 3425e397fb23cc2e8e6fb8f5b8226dcb447e84dd
Version: eeae0a12a16650ff494d5faefa371cd9e7079575
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/tty/vt/vt.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c555cf04684fde39b5b0dd9fd80730030ee10c4a",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "lessThan": "e9ba4611ddf676194385506222cce7b0844e708e",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "lessThan": "f74b4a41c5d7c9522469917e3072e55d435efd9e",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "lessThan": "1cf1930369c9dc428d827b60260c53271bff3285",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "lessThan": "989201bb8c00b222235aff04e6200230d29dc7bb",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "lessThan": "2535431ae967ad17585513649625fea7db28d4db",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "lessThan": "c904fe03c4bd1f356a58797d39e2a5d0ca15cefc",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "lessThan": "566f9c9f89337792070b5a6062dff448b3e7977f",
              "status": "affected",
              "version": "009e39ae44f4191188aeb6dfbf661b771dbbe515",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "e60f8fcce05042e8f8cea25ee81fecc1222114cf",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "5812a9bc9d68a82c2cc839f88e6f7a05093ab39d",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "863ad19fd654c485e3beec3575c4d74a1e74369e",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "dbc3fd44f957a39407e889287bf61fa0ef3ecc14",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "0b2a0a58ad22f9d6dfc641bc5ec46057493f22a5",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "9f2d48f0745f921040df91bfe8fa7f0339cd7497",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "3425e397fb23cc2e8e6fb8f5b8226dcb447e84dd",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "eeae0a12a16650ff494d5faefa371cd9e7079575",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/tty/vt/vt.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.9"
            },
            {
              "lessThan": "4.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.328",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.293",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.258",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.213",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.142",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.66",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.19.*",
              "status": "unaffected",
              "version": "5.19.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.328",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.293",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.258",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.213",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.142",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.66",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19.8",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.2.85",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.10.105",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.12.68",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.16.40",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.18.45",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.1.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.31",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.8.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-23T13:26:12.987Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a"
        },
        {
          "url": "https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e"
        },
        {
          "url": "https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e"
        },
        {
          "url": "https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285"
        },
        {
          "url": "https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb"
        },
        {
          "url": "https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db"
        },
        {
          "url": "https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc"
        },
        {
          "url": "https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f"
        }
      ],
      "title": "vt: Clear selection before changing the font",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-49948",
    "datePublished": "2025-06-18T11:00:12.364Z",
    "dateReserved": "2025-06-18T10:57:27.382Z",
    "dateUpdated": "2025-12-23T13:26:12.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-49948\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-06-18T11:15:21.827\",\"lastModified\":\"2025-11-14T19:49:17.097\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvt: Clear selection before changing the font\\n\\nWhen changing the console font with ioctl(KDFONTOP) the new font size\\ncan be bigger than the previous font. A previous selection may thus now\\nbe outside of the new screen size and thus trigger out-of-bounds\\naccesses to graphics memory if the selection is removed in\\nvc_do_resize().\\n\\nPrevent such out-of-memory accesses by dropping the selection before the\\nvarious con_font_set() console handlers are called.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vt: Borrar la selecci\u00f3n antes de cambiar la fuente. Al cambiar la fuente de la consola con ioctl(KDFONTOP), el nuevo tama\u00f1o de fuente puede ser mayor que el anterior. Por lo tanto, una selecci\u00f3n anterior podr\u00eda quedar fuera del nuevo tama\u00f1o de pantalla y, por lo tanto, provocar accesos fuera de los l\u00edmites a la memoria gr\u00e1fica si se elimina la selecci\u00f3n en vc_do_resize(). Para evitar estos accesos fuera de memoria, elimine la selecci\u00f3n antes de llamar a los controladores de consola con_font_set().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.9.328\",\"matchCriteriaId\":\"82C9EA22-96BE-488C-A979-0A1FBD90A0AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.293\",\"matchCriteriaId\":\"5D9B742D-912D-4E0C-A42F-367086FDEA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.258\",\"matchCriteriaId\":\"253D30F5-3734-4663-883A-288786D3B66E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.213\",\"matchCriteriaId\":\"4C373116-9E23-44BA-A6B7-87C8BF5C3B85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.142\",\"matchCriteriaId\":\"D44AD643-5591-432E-BD41-C2C737F54AC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.66\",\"matchCriteriaId\":\"52AE7E2B-7BE3-4B8A-89CC-AB62434899A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.19.8\",\"matchCriteriaId\":\"7FEC7656-4CE2-424C-8830-EDB160E701C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BD11A3-8643-49B6-BADE-5029A0117325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0AD220-F6A9-4012-8636-155F1B841FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46498B3-78E1-4623-AAE1-94D29A42BE4E\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…