Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2022-49749 First vendor Publication 2025-03-27
Vendor Cve Last vendor Modification 2025-04-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

i2c: designware: use casting of u64 in clock multiplication to avoid overflow

In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of the given parameters including the ic_clk. For example in our use case where ic_clk is larger than one million, multiplication of ic_clk * 4700 will result in 32 bit overflow.

Add cast of u64 to the calculation to avoid multiplication overflow, and use the corresponding define for divide.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49749

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3578

Sources (Detail)

https://git.kernel.org/stable/c/2f29d780bd691d20e89e5b35d5e6568607115e94
https://git.kernel.org/stable/c/9f36aae9e80e79b7a6d62227eaa96935166be9fe
https://git.kernel.org/stable/c/c8c37bc514514999e62a17e95160ed9ebf75ca8d
https://git.kernel.org/stable/c/ed173f77fd28a3e4fffc13b3f28687b9eba61157
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2025-06-26 02:10:18
  • Multiple Updates
2025-06-25 12:23:07
  • Multiple Updates
2025-06-24 02:14:54
  • Multiple Updates
2025-05-27 13:23:54
  • Multiple Updates
2025-05-27 02:11:44
  • Multiple Updates
2025-03-31 17:20:33
  • Multiple Updates
2025-03-27 21:20:36
  • First insertion