
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48804 is a vulnerability in the Linux kernel's virtual terminal (VT) subsystem, specifically in the vtioctl function. The vulnerability was discovered by researchers from the VUSec group at VU Amsterdam and was publicly disclosed in 2022. The issue affects the arrayindexnospec implementation in vtsetactivate, where decreasing a value after bounds checking could lead to a transient integer underflow (Red Hat CVE, NVD).
The vulnerability occurs in the vtioctl function where arrayindexnospec ensures that an out-of-bounds value is set to zero on the transient path. The issue arises when decreasing the value by one after the bounds check, which can cause a transient integer underflow. The correct implementation requires decreasing vsa.console first and then sanitizing it with arrayindex_nospec. The vulnerability has been assigned a CVSS v3.1 base score of 7.1 (High) by Red Hat and 5.5 (Medium) by NVD (Red Hat CVE).
The vulnerability could potentially lead to high confidentiality and availability impacts in affected systems. According to Red Hat's assessment, the vulnerability has high confidentiality impact and high availability impact, while having no integrity impact (Red Hat CVE).
A fix has been implemented in the Linux kernel that changes the order of operations in the vtsetactivate function. The fix involves decreasing vsa.console before applying arrayindex_nospec, rather than after. The patch has been merged into various kernel versions (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."