CVE-2022-49186

Source
https://cve.org/CVERecord?id=CVE-2022-49186
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49186.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49186
Downstream
Published
2025-02-26T01:55:35.590Z
Modified
2026-03-12T03:24:44.518149Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
clk: visconti: prevent array overflow in visconti_clk_register_gates()
Details

In the Linux kernel, the following vulnerability has been resolved:

clk: visconti: prevent array overflow in visconticlkregister_gates()

This code was using -1 to represent that there was no reset function. Unfortunately, the -1 was stored in u8 so the if (clks[i].rsid >= 0) condition was always true. This lead to an out of bounds access in visconticlkregistergates().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49186.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b4cbe606dc3674b25cb661e7cd1a1c6ddaaafaaa
Fixed
2723543c1d60278d5aef1c4ad732dbad24b84a81
Fixed
c5601e0720ce1a3ad895f94a5838530edde01ed3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49186.json"