Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published Jun 18, 2025 to the GitHub Advisory Database • Updated Jun 18, 2025

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

tty: vt: initialize unicode screen buffer

syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read
immediately after resize operation. Initialize buffer using kzalloc().


#include <fcntl.h>
#include <unistd.h>
#include <sys/ioctl.h>
#include <linux/fb.h>

int main(int argc, char *argv[])
{
struct fb_var_screeninfo var = { };
const int fb_fd = open("/dev/fb0", 3);
ioctl(fb_fd, FBIOGET_VSCREENINFO, &var);
var.yres = 0x21;
ioctl(fb_fd, FBIOPUT_VSCREENINFO, &var);
return read(open("/dev/vcsu", O_RDONLY), &var, sizeof(var)) == -1;
}

References

Published by the National Vulnerability Database Jun 18, 2025
Published to the GitHub Advisory Database Jun 18, 2025
Last updated Jun 18, 2025

Severity

Unknown

EPSS score

Weaknesses

No CWEs

CVE ID

CVE-2022-50222

GHSA ID

GHSA-3c52-2wpc-wj62

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.