CVE-2022-39842

Summary

CVECVE-2022-39842
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-09-05 07:15:00 UTC
Updated2023-11-07 03:50:00 UTC
Description** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.

Risk And Classification

Problem Types: CWE-190

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 11.0 All All All
Operating System Linux Linux Kernel All All All All
Operating System Linux Linux Kernel 5.19 rc1 All All
Operating System Linux Linux Kernel 5.19 rc2 All All
Operating System Linux Linux Kernel 5.19 rc3 All All

References

ReferenceSourceLinkTags
Re: [PATCH] pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write MISC lore.kernel.org
video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write · torvalds/linux@a09d2d0 · GitHub MISC github.com
Re: [PATCH] pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write lore.kernel.org
[SECURITY] [DLA 3131-1] linux security update MLIST lists.debian.org
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 MISC cdn.kernel.org
Debian -- Security Information -- DSA-5257-1 linux DEBIAN www.debian.org
[SECURITY] [DLA 3173-1] linux-5.10 security update MLIST lists.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 181091 Debian Security Update for linux (DLA 3131-1)
  • 181145 Debian Security Update for linux (DSA 5257-1)
  • 181190 Debian Security Update for linux-5.10 (DLA 3173-1)
  • 184447 Debian Security Update for linux (CVE-2022-39842)
  • 199087 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5792-1)
  • 199088 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5791-1)
  • 199091 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5791-2)
  • 199094 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5792-2)
  • 199100 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5791-3)
  • 199119 Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-5815-1)
  • 199155 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5854-1)
  • 199164 Ubuntu Security Notification for Linux kernel (Qualcomm Snapdragon) Vulnerabilities (USN-5862-1)
  • 199165 Ubuntu Security Notification for Linux kernel (Dell300x) Vulnerabilities (USN-5861-1)
  • 199169 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5865-1)
  • 199179 Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5877-1)
  • 199502 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5975-1)
  • 199541 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5924-1)
  • 199566 Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-6007-1)
  • 199567 Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-5883-1)
  • 354098 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-037
  • 354100 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2022-009
  • 354101 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-021
  • 354114 Amazon Linux Security Advisory for kernel : ALAS2-2022-1876
  • 354251 Amazon Linux Security Advisory for kernel : ALAS-2022-1645
  • 354439 Amazon Linux Security Advisory for kernel : ALAS2022-2022-150
  • 354468 Amazon Linux Security Advisory for kernel : ALAS2022-2022-185
  • 354542 Amazon Linux Security Advisory for kernel : ALAS-2022-185
  • 355199 Amazon Linux Security Advisory for kernel : ALAS2023-2023-070
  • 377891 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0002)
  • 378043 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2023:0011)
  • 378468 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-20230042)
  • 378512 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0042)
  • 610466 Google Android Devices February 2023 Security Patch Missing
  • 610473 Google Android March 2023 Security Patch Missing for Huawei EMUI
  • 6140410 AWS Bottlerocket Security Update for kernel (GHSA-c7h5-rw3w-f3j2)
  • 672474 EulerOS Security Update for kernel (EulerOS-SA-2022-2823)
  • 903733 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10878)
  • 903846 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10861)
  • 904185 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10878-1)
  • 904264 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10861-1)
  • 905967 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10878-2)
  • 906288 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10861-2)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report