CVE-2022-49189

In the Linux kernel, the following vulnerability has been resolved: clk: qcom: clk-rcg2: Update logic to calculate D value for RCG The display pixel clock has a requirement on certain newer platforms to support M/N as (2/3) and the final D value calculated results in underflow errors. As the current implementation does not check for D value is within the accepted range for a given M & N value. Update the logic to calculate the final D value based on the range.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Oct 2025, 11:57

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: clk-rcg2: Actualizar la lógica para calcular el valor D para RCG El reloj de píxeles de la pantalla tiene un requisito en ciertas plataformas más nuevas para admitir M/N como (2/3) y el valor D final calculado da como resultado errores de desbordamiento. Como la implementación actual no verifica que el valor D esté dentro del rango aceptado para un valor M & N dado. Actualice la lógica para calcular el valor D final según el rango.
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/334720f418f57b1d969dad2117b21f9388cb9395 - () https://git.kernel.org/stable/c/334720f418f57b1d969dad2117b21f9388cb9395 - Patch
References () https://git.kernel.org/stable/c/34dca60982e93e69ae442aa2d36ce61c9a3bb563 - () https://git.kernel.org/stable/c/34dca60982e93e69ae442aa2d36ce61c9a3bb563 - Patch
References () https://git.kernel.org/stable/c/52592f9afbfe01bce8f8953e4f19cbe3bcbdbd3a - () https://git.kernel.org/stable/c/52592f9afbfe01bce8f8953e4f19cbe3bcbdbd3a - Patch
References () https://git.kernel.org/stable/c/58922910add18583d5273c2edcdb9fd7bf4eca02 - () https://git.kernel.org/stable/c/58922910add18583d5273c2edcdb9fd7bf4eca02 - Patch
References () https://git.kernel.org/stable/c/96888f0dcf351e758b9df57e015a48427ca709c1 - () https://git.kernel.org/stable/c/96888f0dcf351e758b9df57e015a48427ca709c1 - Patch
References () https://git.kernel.org/stable/c/a4e2e31971354790b0d1fa3e783452a9d135fcff - () https://git.kernel.org/stable/c/a4e2e31971354790b0d1fa3e783452a9d135fcff - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-10-21 11:57


NVD link : CVE-2022-49189

Mitre link : CVE-2022-49189

CVE.ORG link : CVE-2022-49189


JSON object : View

Products Affected

linux

  • linux_kernel