CVE-2022-49189

Source
https://cve.org/CVERecord?id=CVE-2022-49189
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49189.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49189
Downstream
Related
Published
2025-02-26T01:55:37.095Z
Modified
2026-04-11T12:43:41.008961Z
Summary
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
Details

In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: clk-rcg2: Update logic to calculate D value for RCG

The display pixel clock has a requirement on certain newer platforms to support M/N as (2/3) and the final D value calculated results in underflow errors. As the current implementation does not check for D value is within the accepted range for a given M & N value. Update the logic to calculate the final D value based on the range.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49189.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
99cbd064b059f222c8839ba433a68b2d6ee33066
Fixed
52592f9afbfe01bce8f8953e4f19cbe3bcbdbd3a
Fixed
334720f418f57b1d969dad2117b21f9388cb9395
Fixed
34dca60982e93e69ae442aa2d36ce61c9a3bb563
Fixed
96888f0dcf351e758b9df57e015a48427ca709c1
Fixed
a4e2e31971354790b0d1fa3e783452a9d135fcff
Fixed
58922910add18583d5273c2edcdb9fd7bf4eca02

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49189.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.16.0
Fixed
5.4.189
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.110
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.33
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.19
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49189.json"