We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50102

video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock()



Description

In the Linux kernel, the following vulnerability has been resolved: video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() Since the user can control the arguments of the ioctl() from the user space, under special arguments that may result in a divide-by-zero bug in: drivers/video/fbdev/arkfb.c:784: ark_set_pixclock(info, (hdiv * info->var.pixclock) / hmul); with hdiv=1, pixclock=1 and hmul=2 you end up with (1*1)/2 = (int) 0. and then in: drivers/video/fbdev/arkfb.c:504: rv = dac_set_freq(par->dac, 0, 1000000000 / pixclock); we'll get a division-by-zero. The following log can reveal it: divide error: 0000 [#1] PREEMPT SMP KASAN PTI RIP: 0010:ark_set_pixclock drivers/video/fbdev/arkfb.c:504 [inline] RIP: 0010:arkfb_set_par+0x10fc/0x24c0 drivers/video/fbdev/arkfb.c:784 Call Trace: fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034 do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110 fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189 Fix this by checking the argument of ark_set_pixclock() first.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

681e14730c73cc2c71af282c001de6bc71c22f00 before 76b3f0a0b56e53a960a14624a0f48b3d94b5e7e7
affected

681e14730c73cc2c71af282c001de6bc71c22f00 before b9a66f23612b84617e04412169e155a4b92f632d
affected

681e14730c73cc2c71af282c001de6bc71c22f00 before a249e1b89ca25e1c34bdf96154e3f6224a91a9af
affected

681e14730c73cc2c71af282c001de6bc71c22f00 before 0288fa799e273b08839037499d704dc7bdc13e9a
affected

681e14730c73cc2c71af282c001de6bc71c22f00 before 236c1502520b7b08955467ec2e50b3232e34f1f9
affected

681e14730c73cc2c71af282c001de6bc71c22f00 before 9ebc5031958c1f3a2795e4533b4091d77c738d14
affected

681e14730c73cc2c71af282c001de6bc71c22f00 before 15661642511b2b192077684a89f42a8d95d54286
affected

681e14730c73cc2c71af282c001de6bc71c22f00 before 2f1c4523f7a3aaabe7e53d3ebd378292947e95c8
affected

Default status
affected

2.6.22
affected

Any version before 2.6.22
unaffected

4.14.291
unaffected

4.19.256
unaffected

5.4.211
unaffected

5.10.137
unaffected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/76b3f0a0b56e53a960a14624a0f48b3d94b5e7e7

git.kernel.org/...c/b9a66f23612b84617e04412169e155a4b92f632d

git.kernel.org/...c/a249e1b89ca25e1c34bdf96154e3f6224a91a9af

git.kernel.org/...c/0288fa799e273b08839037499d704dc7bdc13e9a

git.kernel.org/...c/236c1502520b7b08955467ec2e50b3232e34f1f9

git.kernel.org/...c/9ebc5031958c1f3a2795e4533b4091d77c738d14

git.kernel.org/...c/15661642511b2b192077684a89f42a8d95d54286

git.kernel.org/...c/2f1c4523f7a3aaabe7e53d3ebd378292947e95c8

cve.org (CVE-2022-50102)

nvd.nist.gov (CVE-2022-50102)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50102

Support options

Helpdesk Chat, Email, Knowledgebase