Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-48987

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-21 Oct, 2024 | 20:06
Updated At-04 May, 2025 | 08:27
Rejected At-
Credits

media: v4l2-dv-timings.c: fix too strict blanking sanity checks

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-dv-timings.c: fix too strict blanking sanity checks Sanity checks were added to verify the v4l2_bt_timings blanking fields in order to avoid integer overflows when userspace passes weird values. But that assumed that userspace would correctly fill in the front porch, backporch and sync values, but sometimes all you know is the total blanking, which is then assigned to just one of these fields. And that can fail with these checks. So instead set a maximum for the total horizontal and vertical blanking and check that each field remains below that. That is still sufficient to avoid integer overflows, but it also allows for more flexibility in how userspace fills in these fields.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:21 Oct, 2024 | 20:06
Updated At:04 May, 2025 | 08:27
Rejected At:
▼CVE Numbering Authority (CNA)
media: v4l2-dv-timings.c: fix too strict blanking sanity checks

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-dv-timings.c: fix too strict blanking sanity checks Sanity checks were added to verify the v4l2_bt_timings blanking fields in order to avoid integer overflows when userspace passes weird values. But that assumed that userspace would correctly fill in the front porch, backporch and sync values, but sometimes all you know is the total blanking, which is then assigned to just one of these fields. And that can fail with these checks. So instead set a maximum for the total horizontal and vertical blanking and check that each field remains below that. That is still sufficient to avoid integer overflows, but it also allows for more flexibility in how userspace fills in these fields.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/v4l2-core/v4l2-dv-timings.c
Default Status
unaffected
Versions
Affected
  • From 15ded23db134da975b49ea99770de0346c193b24 before 0d73b49c4037199472b29574ae21c21aef493971 (git)
  • From 3d43b2b8a3cdadd6cef9ac8ef5d156b6214a01c8 before a2b56627c0d13009e02f6f2c0206c0451ed19a0e (git)
  • From 9cf9211635b68e8e0c8cb88d43ca7dc83e4632aa before 2572ab14b73aa45b6ae7e4c089ccf119fed5cf89 (git)
  • From b4a3a01762ae072c7f6ff2ff53b5019761288346 before 4afc77068e36cee45b39d4fdc7513de26980f72c (git)
  • From 683015ae163481457a16fad2317af66360dc4762 before 32f01f0306a98629508f84d7ef0d1d037bc274a2 (git)
  • From 491c0959f01d87bcbd5a1498bc70e0a3382c65a8 before 6fb8bc29bfa80707994a63cc97e2f9920e0b0608 (git)
  • From dc7276c3f6ca008be1faf531f84b49906c9bcf7f before d3d14cdf1c7ae2caa3e999bae95ba99e955fb7c3 (git)
  • From 4b6d66a45ed34a15721cb9e11492fa1a24bc83df before 5eef2141776da02772c44ec406d6871a790761ee (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/v4l2-core/v4l2-dv-timings.c
Default Status
unaffected
Versions
Affected
  • From 4.9.332 before 4.9.336 (semver)
  • From 4.14.298 before 4.14.302 (semver)
  • From 4.19.264 before 4.19.269 (semver)
  • From 5.4.223 before 5.4.227 (semver)
  • From 5.10.153 before 5.10.159 (semver)
  • From 5.15.77 before 5.15.83 (semver)
  • From 6.0.7 before 6.0.13 (semver)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/0d73b49c4037199472b29574ae21c21aef493971
N/A
https://git.kernel.org/stable/c/a2b56627c0d13009e02f6f2c0206c0451ed19a0e
N/A
https://git.kernel.org/stable/c/2572ab14b73aa45b6ae7e4c089ccf119fed5cf89
N/A
https://git.kernel.org/stable/c/4afc77068e36cee45b39d4fdc7513de26980f72c
N/A
https://git.kernel.org/stable/c/32f01f0306a98629508f84d7ef0d1d037bc274a2
N/A
https://git.kernel.org/stable/c/6fb8bc29bfa80707994a63cc97e2f9920e0b0608
N/A
https://git.kernel.org/stable/c/d3d14cdf1c7ae2caa3e999bae95ba99e955fb7c3
N/A
https://git.kernel.org/stable/c/5eef2141776da02772c44ec406d6871a790761ee
N/A
Hyperlink: https://git.kernel.org/stable/c/0d73b49c4037199472b29574ae21c21aef493971
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a2b56627c0d13009e02f6f2c0206c0451ed19a0e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2572ab14b73aa45b6ae7e4c089ccf119fed5cf89
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4afc77068e36cee45b39d4fdc7513de26980f72c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/32f01f0306a98629508f84d7ef0d1d037bc274a2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6fb8bc29bfa80707994a63cc97e2f9920e0b0608
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d3d14cdf1c7ae2caa3e999bae95ba99e955fb7c3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5eef2141776da02772c44ec406d6871a790761ee
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:21 Oct, 2024 | 20:15
Updated At:01 Nov, 2024 | 15:27

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-dv-timings.c: fix too strict blanking sanity checks Sanity checks were added to verify the v4l2_bt_timings blanking fields in order to avoid integer overflows when userspace passes weird values. But that assumed that userspace would correctly fill in the front porch, backporch and sync values, but sometimes all you know is the total blanking, which is then assigned to just one of these fields. And that can fail with these checks. So instead set a maximum for the total horizontal and vertical blanking and check that each field remains below that. That is still sufficient to avoid integer overflows, but it also allows for more flexibility in how userspace fills in these fields.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.9.332(inclusive) to 4.9.336(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.14.298(inclusive) to 4.14.302(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.19.264(inclusive) to 4.19.269(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.4.226(inclusive) to 5.4.227(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.10.153(inclusive) to 5.10.159(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.15.77(inclusive) to 5.15.83(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.0.7(inclusive) to 6.0.13(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-190Primarynvd@nist.gov
CWE ID: CWE-190
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/0d73b49c4037199472b29574ae21c21aef493971416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/2572ab14b73aa45b6ae7e4c089ccf119fed5cf89416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/32f01f0306a98629508f84d7ef0d1d037bc274a2416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/4afc77068e36cee45b39d4fdc7513de26980f72c416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/5eef2141776da02772c44ec406d6871a790761ee416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/6fb8bc29bfa80707994a63cc97e2f9920e0b0608416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a2b56627c0d13009e02f6f2c0206c0451ed19a0e416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/d3d14cdf1c7ae2caa3e999bae95ba99e955fb7c3416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/0d73b49c4037199472b29574ae21c21aef493971
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2572ab14b73aa45b6ae7e4c089ccf119fed5cf89
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/32f01f0306a98629508f84d7ef0d1d037bc274a2
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/4afc77068e36cee45b39d4fdc7513de26980f72c
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/5eef2141776da02772c44ec406d6871a790761ee
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/6fb8bc29bfa80707994a63cc97e2f9920e0b0608
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a2b56627c0d13009e02f6f2c0206c0451ed19a0e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/d3d14cdf1c7ae2caa3e999bae95ba99e955fb7c3
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found