๐Ÿ” CVE Alert

CVE-2022-49749

MEDIUM 5.5

i2c: designware: use casting of u64 in clock multiplication to avoid overflow

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of the given parameters including the ic_clk. For example in our use case where ic_clk is larger than one million, multiplication of ic_clk * 4700 will result in 32 bit overflow. Add cast of u64 to the calculation to avoid multiplication overflow, and use the corresponding define for divide.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2373f6b9744d5373b886f3ce1a985193cca0a356 < ed173f77fd28a3e4fffc13b3f28687b9eba61157 2373f6b9744d5373b886f3ce1a985193cca0a356 < 2f29d780bd691d20e89e5b35d5e6568607115e94 2373f6b9744d5373b886f3ce1a985193cca0a356 < 9f36aae9e80e79b7a6d62227eaa96935166be9fe 2373f6b9744d5373b886f3ce1a985193cca0a356 < c8c37bc514514999e62a17e95160ed9ebf75ca8d
Linux / Linux
3.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ed173f77fd28a3e4fffc13b3f28687b9eba61157 git.kernel.org: https://git.kernel.org/stable/c/2f29d780bd691d20e89e5b35d5e6568607115e94 git.kernel.org: https://git.kernel.org/stable/c/9f36aae9e80e79b7a6d62227eaa96935166be9fe git.kernel.org: https://git.kernel.org/stable/c/c8c37bc514514999e62a17e95160ed9ebf75ca8d