CVE-2022-50010
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-369 | The product divides a value by zero. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a divide-by-zero bug in the Linux kernel's i740fb video driver. It occurs because the driver does not properly check the 'pixclock' argument passed from user space to the ioctl() function. If a specially crafted 'pixclock' value is provided that causes the argument of the function i740_calc_vclk() to be less than a fixed threshold (I740_RFREQ_FIX), it results in a divide-by-zero error, potentially causing a kernel crash.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash due to a divide-by-zero error when a malicious user provides improper input to the video driver. This can lead to denial of service (system instability or crash) on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for the specific divide-by-zero error messages related to i740fb. Look for logs containing 'divide error: 0000 [#1] PREEMPT SMP KASAN PTI' and references to 'i740_calc_vclk' and 'i740fb_decode_var'. You can use commands like 'dmesg | grep -i divide' or 'journalctl -k | grep -i i740fb' to find such messages.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where the i740fb driver checks the argument of i740_calc_vclk() to prevent the divide-by-zero error. Until then, restrict untrusted users from accessing the ioctl interface of the i740fb driver to prevent exploitation.