Lucene search

K
cveLinuxCVE-2022-48945
HistorySep 23, 2024 - 10:15 a.m.

CVE-2022-48945

2024-09-2310:15:02
Linux
web.nvd.nist.gov
7
linux kernel
media vivid
compose size
boundary
vulnerability
resolved
syzkaller
bug
page fault
address
ffffc9000a3b1000
oops
error code
cpu
pid
qemu
bios
memcpy_erms
call trace
v4l2_rect_map_inside
cve

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

13.8%

In the Linux kernel, the following vulnerability has been resolved:

media: vivid: fix compose size exceed boundary

syzkaller found a bug:

BUG: unable to handle page fault for address: ffffc9000a3b1000
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0
Oops: 0002 [#1] PREEMPT SMP
CPU: 0 PID: 23489 Comm: vivid-000-vid-c Not tainted 6.1.0-rc1+ #512
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:memcpy_erms+0x6/0x10
[…]
Call Trace:
<TASK>
? tpg_fill_plane_buffer+0x856/0x15b0
vivid_fillbuff+0x8ac/0x1110
vivid_thread_vid_cap_tick+0x361/0xc90
vivid_thread_vid_cap+0x21a/0x3a0
kthread+0x143/0x180
ret_from_fork+0x1f/0x30
</TASK>

This is because we forget to check boundary after adjust compose->height
int V4L2_SEL_TGT_CROP case. Add v4l2_rect_map_inside() to fix this problem
for this case.

Affected configurations

Vulners
Node
linuxlinux_kernelRange3.184.9.337
OR
linuxlinux_kernelRange4.10.04.14.303
OR
linuxlinux_kernelRange4.15.04.19.270
OR
linuxlinux_kernelRange4.20.05.4.229
OR
linuxlinux_kernelRange5.5.05.10.163
OR
linuxlinux_kernelRange5.11.05.15.86
OR
linuxlinux_kernelRange5.16.06.0.16
OR
linuxlinux_kernelRange6.1.06.1.2
OR
linuxlinux_kernelRange6.2.0
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/media/test-drivers/vivid/vivid-vid-cap.c"
    ],
    "versions": [
      {
        "version": "ef834f7836ec",
        "lessThan": "8c0ee15d9a10",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "5edc36041519",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "9c7fba9503b8",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "54f259906039",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "f9d19f3a044c",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "ab54081a2843",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "ccb5392c4fea",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "2f558c5208b0",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "ef834f7836ec",
        "lessThan": "94a7ad928346",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/media/test-drivers/vivid/vivid-vid-cap.c"
    ],
    "versions": [
      {
        "version": "3.18",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "3.18",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.9.337",
        "lessThanOrEqual": "4.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.14.303",
        "lessThanOrEqual": "4.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.270",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.229",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.163",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.86",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.0.16",
        "lessThanOrEqual": "6.0.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.2",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.2",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

13.8%

Related for CVE-2022-48945