We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49749

i2c: designware: use casting of u64 in clock multiplication to avoid overflow



Description

In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of the given parameters including the ic_clk. For example in our use case where ic_clk is larger than one million, multiplication of ic_clk * 4700 will result in 32 bit overflow. Add cast of u64 to the calculation to avoid multiplication overflow, and use the corresponding define for divide.

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

2373f6b9744d5373b886f3ce1a985193cca0a356 before ed173f77fd28a3e4fffc13b3f28687b9eba61157
affected

2373f6b9744d5373b886f3ce1a985193cca0a356 before 2f29d780bd691d20e89e5b35d5e6568607115e94
affected

2373f6b9744d5373b886f3ce1a985193cca0a356 before 9f36aae9e80e79b7a6d62227eaa96935166be9fe
affected

2373f6b9744d5373b886f3ce1a985193cca0a356 before c8c37bc514514999e62a17e95160ed9ebf75ca8d
affected

Default status
affected

3.2
affected

Any version before 3.2
unaffected

5.10.166
unaffected

5.15.91
unaffected

6.1.9
unaffected

6.2
unaffected

References

git.kernel.org/...c/ed173f77fd28a3e4fffc13b3f28687b9eba61157

git.kernel.org/...c/2f29d780bd691d20e89e5b35d5e6568607115e94

git.kernel.org/...c/9f36aae9e80e79b7a6d62227eaa96935166be9fe

git.kernel.org/...c/c8c37bc514514999e62a17e95160ed9ebf75ca8d

cve.org (CVE-2022-49749)

nvd.nist.gov (CVE-2022-49749)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49749

Support options

Helpdesk Chat, Email, Knowledgebase