CVE-2022-49189

high

Description

In the Linux kernel, the following vulnerability has been resolved: clk: qcom: clk-rcg2: Update logic to calculate D value for RCG The display pixel clock has a requirement on certain newer platforms to support M/N as (2/3) and the final D value calculated results in underflow errors. As the current implementation does not check for D value is within the accepted range for a given M & N value. Update the logic to calculate the final D value based on the range.

References

https://git.kernel.org/stable/c/a4e2e31971354790b0d1fa3e783452a9d135fcff

https://git.kernel.org/stable/c/96888f0dcf351e758b9df57e015a48427ca709c1

https://git.kernel.org/stable/c/58922910add18583d5273c2edcdb9fd7bf4eca02

https://git.kernel.org/stable/c/52592f9afbfe01bce8f8953e4f19cbe3bcbdbd3a

https://git.kernel.org/stable/c/34dca60982e93e69ae442aa2d36ce61c9a3bb563

https://git.kernel.org/stable/c/334720f418f57b1d969dad2117b21f9388cb9395

Details

Source: Mitre, NVD

Published: 2025-02-26

Updated: 2025-02-26

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High