
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49612 affects the Linux kernel's power supply core component. The vulnerability was discovered in the boundary conditions handling of the powersupplytemp2resistsimple and powersupplyocv2capsimple functions. This issue was introduced in commit a4585ba2050f ('power: supply: core: Use library interpolation') (Kernel Git).
The vulnerability involves two specific issues in the interpolation functions: 1) The lines 'high = i - 1' and 'high = i' in ocv2cap have incorrect order compared to temp2resist, causing ocv2cap to set high=-1 if ocv>table[0].ocv, resulting in an out-of-bounds read. 2) The temp2resist logic is flawed - for example, with table[] = {{20, 100}, {10, 80}, {0, 60}} and temp=5, it should return 70% by interpolation, but instead sets high=low=2 and returns 60 (Kernel Git).
The vulnerability can lead to out-of-bounds read operations in the Linux kernel's power supply subsystem, potentially affecting power management functionality and system stability (NVD).
The vulnerability has been fixed in the Linux kernel through patches that correct the boundary condition handling in both affected functions. The fix has been implemented in commit 093d27bb6f2d1963f927ef59c9a2d37059175426 and backported to stable kernel versions (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."