-

CVE-2022-50097

In the Linux kernel, the following vulnerability has been resolved:

video: fbdev: s3fb: Check the size of screen before memset_io()

In the function s3fb_set_par(), the value of 'screen_size' is
calculated by the user input. If the user provides the improper value,
the value of 'screen_size' may larger than 'info->screen_size', which
may cause the following bug:

[   54.083733] BUG: unable to handle page fault for address: ffffc90003000000
[   54.083742] #PF: supervisor write access in kernel mode
[   54.083744] #PF: error_code(0x0002) - not-present page
[   54.083760] RIP: 0010:memset_orig+0x33/0xb0
[   54.083782] Call Trace:
[   54.083788]  s3fb_set_par+0x1ec6/0x4040
[   54.083806]  fb_set_var+0x604/0xeb0
[   54.083836]  do_fb_ioctl+0x234/0x670

Fix the this by checking the value of 'screen_size' before memset_io().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 574912261528589012b61f82d368256247c3a5a8
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
Version < 3c35a0dc2b4e7acf24c796043b64fa3eee799239
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
Version < eacb50f1733660911827d7c3720f4c5425d0cdda
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
Version < 5e0da18956d38e7106664dc1d06367b22f06edd3
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
Version < ce50d94afcb8690813c5522f24cd38737657db81
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
Version < 52461d387cc8c8f8dc40320caa2e9e101f73e7ba
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
Version < e2d7cacc6a2a1d77e7e20a492daf458a12cf19e0
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
Version < 6ba592fa014f21f35a8ee8da4ca7b95a018f13e8
Version a268422de8bf1b4c0cb97987b6c329c9f6a3da4b
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.21
Status affected
Version < 2.6.21
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.291
Status unaffected
Version <= 4.19.*
Version 4.19.256
Status unaffected
Version <= 5.4.*
Version 5.4.211
Status unaffected
Version <= 5.10.*
Version 5.10.137
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.094
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string