We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of the given parameters including the ic_clk. For example in our use case where ic_clk is larger than one million, multiplication of ic_clk * 4700 will result in 32 bit overflow. Add cast of u64 to the calculation to avoid multiplication overflow, and use the corresponding define for divide.
Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/ed173f77fd28a3e4fffc13b3f28687b9eba61157
git.kernel.org/...c/2f29d780bd691d20e89e5b35d5e6568607115e94
git.kernel.org/...c/9f36aae9e80e79b7a6d62227eaa96935166be9fe
git.kernel.org/...c/c8c37bc514514999e62a17e95160ed9ebf75ca8d
Support options