U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49978 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: fbdev: fb_pm2fb: Avoid potential divide by zero error In `do_fb_ioctl()` of fbmem.c, if cmd is FBIOPUT_VSCREENINFO, var will be copied from user, then go through `fb_set_var()` and `info->fbops->fb_check_var()` which could may be `pm2fb_check_var()`. Along the path, `var->pixclock` won't be modified. This function checks whether reciprocal of `var->pixclock` is too high. If `var->pixclock` is zero, there will be a divide by zero error. So, it is necessary to check whether denominator is zero to avoid crash. As this bug is found by Syzkaller, logs are listed below. divide error in pm2fb_check_var Call Trace: <TASK> fb_set_var+0x367/0xeb0 drivers/video/fbdev/core/fbmem.c:1015 do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110 fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0f1174f4972ea9fad6becf8881d71adca8e9ca91 kernel.org
https://git.kernel.org/stable/c/19f953e7435644b81332dd632ba1b2d80b1e37af kernel.org
https://git.kernel.org/stable/c/34c3dea1189525cd533071ed5c176fc4ea8d982b kernel.org
https://git.kernel.org/stable/c/3ec326a6a0d4667585ca595f438c7293e5ced7c4 kernel.org
https://git.kernel.org/stable/c/7d9591b32a9092fc6391a316b56e8016c6181c3d kernel.org
https://git.kernel.org/stable/c/7f88cdfea8d7f4dbaf423d808241403b2bb945e4 kernel.org
https://git.kernel.org/stable/c/8fc778ee2fb2853f7a3531fa7273349640d8e4e9 kernel.org
https://git.kernel.org/stable/c/cb4bb011a683532841344ca7f281b5e04389b4f8 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49978
NVD Published Date:
06/18/2025
NVD Last Modified:
06/18/2025
Source:
kernel.org