CVE-2024-35823

MEDIUM

Linux Kernel < 4.19.312 - Buffer Overflow

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: vt: fix unicode buffer corruption when deleting characters This is the same issue that was fixed for the VGA text buffer in commit 39cdb68c64d8 ("vt: fix memory overlapping when deleting chars in the buffer"). The cure is also the same i.e. replace memcpy() with memmove() due to the overlaping buffers.

Scores

CVSS v3 5.3
EPSS 0.0027
EPSS Percentile 50.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-120
Status published
Products (10)
debian/debian_linux 10.0
linux/Kernel 3.7.0 - 4.19.312linux
linux/Kernel 4.20.0 - 5.4.274linux
linux/Kernel 5.11.0 - 5.15.154linux
linux/Kernel 5.16.0 - 6.1.84linux
linux/Kernel 5.5.0 - 5.10.215linux
linux/Kernel 6.2.0 - 6.6.24linux
linux/Kernel 6.7.0 - 6.7.12linux
linux/linux_kernel 6.8 rc1 (6 CPE variants)
linux/linux_kernel 3.7 - 4.19.312
Published May 17, 2024
Tracked Since Feb 18, 2026