
Cloud Vulnerability DB
A community-led vulnerabilities database
An integer overflow vulnerability (CVE-2022-39842) was discovered in the Linux kernel before version 5.19. The issue exists in the pxa3xx_gcu_write function in drivers/video/fbdev/pxa3xx-gcu.c, where a type conflict between size_t and int for the count parameter could potentially cause an integer overflow and bypass size checks (NVD).
The vulnerability stems from a type mismatch in the pxa3xx_gcu_write function where the count parameter of type size_t is assigned to a variable 'words' of type int. This could theoretically lead to an integer overflow when used as the third argument to copy_from_user(). The vulnerability has a CVSS v3.1 Base Score of 6.1 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) (NVD).
While initially thought to be exploitable, the vulnerability's actual impact is limited. The count parameter is capped at MAX_RW_COUNT in vfs_write(), preventing negative values. Additionally, copy_from_user() includes checks that prevent exploitation through the check_copy_size() function (Kernel Mailing List).
The issue was fixed by changing the type of the 'words' variable from int to size_t, ensuring proper type consistency. The fix was included in Linux kernel version 5.19. Additionally, the vulnerable driver is not enabled in some distributions' official kernel configurations, such as Debian (Debian Security Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."