Description
In the Linux kernel, the following vulnerability has been resolved: vt: fix unicode buffer corruption when deleting characters This is the same issue that was fixed for the VGA text buffer in commit 39cdb68c64d8 ("vt: fix memory overlapping when deleting chars in the buffer"). The cure is also the same i.e. replace memcpy() with memmove() due to the overlaping buffers.
References (10)
Core 10
Core References
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Scores
CVSS v3
5.3
EPSS
0.0027
EPSS Percentile
50.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (10)
debian/debian_linux
10.0
linux/Kernel
3.7.0 - 4.19.312linux
linux/Kernel
4.20.0 - 5.4.274linux
linux/Kernel
5.11.0 - 5.15.154linux
linux/Kernel
5.16.0 - 6.1.84linux
linux/Kernel
5.5.0 - 5.10.215linux
linux/Kernel
6.2.0 - 6.6.24linux
linux/Kernel
6.7.0 - 6.7.12linux
linux/linux_kernel
6.8 rc1 (6 CPE variants)
linux/linux_kernel
3.7 - 4.19.312
Published
May 17, 2024
Tracked Since
Feb 18, 2026