CVE-2022-49749

Source
https://cve.org/CVERecord?id=CVE-2022-49749
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49749.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49749
Downstream
Related
Published
2025-03-27T16:42:58.426Z
Modified
2026-04-11T12:44:28.938474Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
i2c: designware: use casting of u64 in clock multiplication to avoid overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

i2c: designware: use casting of u64 in clock multiplication to avoid overflow

In functions i2cdwscllcnt() and i2cdwsclhcnt() may have overflow by depending on the values of the given parameters including the icclk. For example in our use case where icclk is larger than one million, multiplication of ic_clk * 4700 will result in 32 bit overflow.

Add cast of u64 to the calculation to avoid multiplication overflow, and use the corresponding define for divide.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49749.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2373f6b9744d5373b886f3ce1a985193cca0a356
Fixed
ed173f77fd28a3e4fffc13b3f28687b9eba61157
Fixed
2f29d780bd691d20e89e5b35d5e6568607115e94
Fixed
9f36aae9e80e79b7a6d62227eaa96935166be9fe
Fixed
c8c37bc514514999e62a17e95160ed9ebf75ca8d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49749.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.2.0
Fixed
5.10.166
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.91
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49749.json"