CVE-2022-48657

Source
https://cve.org/CVERecord?id=CVE-2022-48657
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48657.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48657
Downstream
Related
Published
2024-04-28T13:01:08.975Z
Modified
2026-03-20T12:21:43.019761Z
Summary
arm64: topology: fix possible overflow in amu_fie_setup()
Details

In the Linux kernel, the following vulnerability has been resolved:

arm64: topology: fix possible overflow in amufiesetup()

cpufreqgethwmaxfreq() returns max frequency in kHz as unsigned int, while freqinvsetmaxratio() gets passed this frequency in Hz as 'u64'. Multiplying max frequency by 1000 can potentially result in overflow -- multiplying by 1000ULL instead should avoid that...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48657.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cd0ed03a8903a0b0c6fc36e32d133d1ddfe70cd6
Fixed
904f881b57360cf85de962d84d8614d94431f60e
Fixed
3c3edb82d67b2be9231174ac2af4af60d4af7549
Fixed
bb6d99e27cbe6b30e4e3bbd32927fd3b0bdec6eb
Fixed
d4955c0ad77dbc684fc716387070ac24801b8bca

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48657.json"