First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: watchdog: rzg2l_wdt: Fix 32bit overflow issue The value of timer_cycle_us can be 0 due to 32bit overflow. For eg:- If we assign the counter value "0xfff" for computing maxval. This patch fixes this issue by appending ULL to 1024, so that it is promoted to 64bit. This patch also fixes the warning message, 'watchdog: Invalid min and max timeout values, resetting to 0!'.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.17<5.17.15 | |
Linux Kernel | >=5.18<5.18.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49387 has been classified as a low severity vulnerability due to the nature of the overflow issue.
To fix CVE-2022-49387, you should update your Linux kernel to a version that includes the patch addressing the overflow issue.
CVE-2022-49387 affects Linux kernel versions between 5.17 and 5.18.4.
The impact of CVE-2022-49387 is primarily related to potential instability or unintended behavior due to timer cycle miscalculations.
CVE-2022-49387 is not classified as remotely exploitable as it requires specific conditions related to system configuration.