{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-39842","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-03T12:07:42.999Z","dateReserved":"2022-09-05T00:00:00.000Z","datePublished":"2022-09-05T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2022-12-19T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen."}],"tags":["disputed"],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19"},{"url":"https://github.com/torvalds/linux/commit/a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7"},{"name":"[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"},{"name":"DSA-5257","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5257"},{"name":"[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"url":"https://lore.kernel.org/all/YylaC1wHHyLw22D3%40kadam/T/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:07:42.999Z"},"title":"CVE Program Container","references":[{"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19","tags":["x_transferred"]},{"url":"https://github.com/torvalds/linux/commit/a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"},{"name":"DSA-5257","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5257"},{"name":"[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"url":"https://lore.kernel.org/all/YylaC1wHHyLw22D3%40kadam/T/","tags":["x_transferred"]}]}]}}