CVE-2022-49189
26.02.2025, 07:00
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: clk-rcg2: Update logic to calculate D value for RCG The display pixel clock has a requirement on certain newer platforms to support M/N as (2/3) and the final D value calculated results in underflow errors. As the current implementation does not check for D value is within the accepted range for a given M & N value. Update the logic to calculate the final D value based on the range.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.16 ≤ 𝑥 < 5.4.189 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.110 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.33 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.16.19 |
| linux | linux_kernel | 5.17 ≤ 𝑥 < 5.17.2 |
𝑥
= Vulnerable software versions
Debian Releases
References