We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50010

video: fbdev: i740fb: Check the argument of i740_calc_vclk()



Description

In the Linux kernel, the following vulnerability has been resolved: video: fbdev: i740fb: Check the argument of i740_calc_vclk() Since the user can control the arguments of the ioctl() from the user space, under special arguments that may result in a divide-by-zero bug. If the user provides an improper 'pixclock' value that makes the argumet of i740_calc_vclk() less than 'I740_RFREQ_FIX', it will cause a divide-by-zero bug in: drivers/video/fbdev/i740fb.c:353 p_best = min(15, ilog2(I740_MAX_VCO_FREQ / (freq / I740_RFREQ_FIX))); The following log can reveal it: divide error: 0000 [#1] PREEMPT SMP KASAN PTI RIP: 0010:i740_calc_vclk drivers/video/fbdev/i740fb.c:353 [inline] RIP: 0010:i740fb_decode_var drivers/video/fbdev/i740fb.c:646 [inline] RIP: 0010:i740fb_set_par+0x163f/0x3b70 drivers/video/fbdev/i740fb.c:742 Call Trace: fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034 do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110 fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189 Fix this by checking the argument of i740_calc_vclk() first.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 59cefb583c984c0da8cf21a4c57d26d5a20dff5c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 656689cb03ada4650016c153346939a1c334b1ae
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before d2d375eb68b4b8de6ea7460483a26fa9de56b443
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 2b7f559152a33c55f51b569b22efbe5e24886798
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4b20c61365140d432dee7da7aa294215e7b900d9
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e740e787f06671455b59d1e498c9945f7b4e7b3b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f350812e2d15278f1d867eeb997407782234fb3c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 40bf722f8064f50200b8c4f8946cd625b441dda9
affected

Default status
affected

4.9.326
unaffected

4.14.291
unaffected

4.19.256
unaffected

5.4.211
unaffected

5.10.138
unaffected

5.15.63
unaffected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/59cefb583c984c0da8cf21a4c57d26d5a20dff5c

git.kernel.org/...c/656689cb03ada4650016c153346939a1c334b1ae

git.kernel.org/...c/d2d375eb68b4b8de6ea7460483a26fa9de56b443

git.kernel.org/...c/2b7f559152a33c55f51b569b22efbe5e24886798

git.kernel.org/...c/4b20c61365140d432dee7da7aa294215e7b900d9

git.kernel.org/...c/e740e787f06671455b59d1e498c9945f7b4e7b3b

git.kernel.org/...c/f350812e2d15278f1d867eeb997407782234fb3c

git.kernel.org/...c/40bf722f8064f50200b8c4f8946cd625b441dda9

cve.org (CVE-2022-50010)

nvd.nist.gov (CVE-2022-50010)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50010

Support options

Helpdesk Chat, Email, Knowledgebase