Rapid7 Vulnerability & Exploit Database

Oracle Linux: (CVE-2022-48627) (Multiple Advisories): kernel security update

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: (CVE-2022-48627) (Multiple Advisories): kernel security update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/02/2024
Created
06/07/2024
Added
06/06/2024
Modified
07/19/2024

Description

In the Linux kernel, the following vulnerability has been resolved:

vt: fix memory overlapping when deleting chars in the buffer

A memory overlapping copy occurs when deleting a long line. This memory

overlapping copy can cause data corruption when scr_memcpyw is optimized

to memcpy because memcpy does not ensure its behavior if the destination

buffer overlaps with the source buffer. The line buffer is not always

broken, because the memcpy utilizes the hardware acceleration, whose

result is not deterministic.

Fix this problem by using replacing the scr_memcpyw with scr_memmovew.

Solution(s)

  • oracle-linux-upgrade-kernel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;