CVE-2022-50222

Source
https://cve.org/CVERecord?id=CVE-2022-50222
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50222.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50222
Downstream
Related
Published
2025-06-18T11:03:56.744Z
Modified
2026-05-15T11:54:16.622665342Z
Summary
tty: vt: initialize unicode screen buffer
Details

In the Linux kernel, the following vulnerability has been resolved:

tty: vt: initialize unicode screen buffer

syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read immediately after resize operation. Initialize buffer using kzalloc().


#include <fcntl.h> #include <unistd.h> #include <sys/ioctl.h> #include <linux/fb.h>

int main(int argc, char *argv[]) { struct fbvarscreeninfo var = { }; const int fbfd = open("/dev/fb0", 3); ioctl(fbfd, FBIOGETVSCREENINFO, &var); var.yres = 0x21; ioctl(fbfd, FBIOPUTVSCREENINFO, &var); return read(open("/dev/vcsu", ORDONLY), &var, sizeof(var)) == -1; }


Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50222.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.19.0
Fixed
4.19.256
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.211
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.137
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.61
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.18
Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
5.19.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50222.json"