In the Linux kernel, the following vulnerability has been resolved:
i2c: designware: use casting of u64 in clock multiplication to avoid overflow
In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow
by depending on the values of the given parameters including the ic_clk.
For example in our use case where ic_clk is larger than one million,
multiplication of ic_clk * 4700 will result in 32 bit overflow.
Add cast of u64 to the calculation to avoid multiplication overflow, and
use the corresponding define for divide.
References
Configurations
Configuration 1 (hide)
|
History
14 Apr 2025, 20:27
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/2f29d780bd691d20e89e5b35d5e6568607115e94 - Patch | |
References | () https://git.kernel.org/stable/c/9f36aae9e80e79b7a6d62227eaa96935166be9fe - Patch | |
References | () https://git.kernel.org/stable/c/c8c37bc514514999e62a17e95160ed9ebf75ca8d - Patch | |
References | () https://git.kernel.org/stable/c/ed173f77fd28a3e4fffc13b3f28687b9eba61157 - Patch | |
Summary |
|
27 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 17:15
Updated : 2025-04-14 20:27
NVD link : CVE-2022-49749
Mitre link : CVE-2022-49749
CVE.ORG link : CVE-2022-49749
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound