CVE-2022-50366

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue When value < time_unit, the parameter of ilog2() will be zero and the return value is -1. u64(-1) is too large for shift exponent and then will trigger shift-out-of-bounds: shift exponent 18446744073709551615 is too large for 32-bit type 'int' Call Trace: rapl_compute_time_window_core rapl_write_data_raw set_time_window store_constraint_time_window_us
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Dec 2025, 18:25

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/139bbbd01114433b80fe59f5e1330615aadf9752 - () https://git.kernel.org/stable/c/139bbbd01114433b80fe59f5e1330615aadf9752 - Patch
References () https://git.kernel.org/stable/c/1d94af37565e4d3c26b0d63428e093a37d5b4c32 - () https://git.kernel.org/stable/c/1d94af37565e4d3c26b0d63428e093a37d5b4c32 - Patch
References () https://git.kernel.org/stable/c/2d93540014387d1c73b9ccc4d7895320df66d01b - () https://git.kernel.org/stable/c/2d93540014387d1c73b9ccc4d7895320df66d01b - Patch
References () https://git.kernel.org/stable/c/3eb0ba70376f6ee40fa843fc9cee49269370b0b3 - () https://git.kernel.org/stable/c/3eb0ba70376f6ee40fa843fc9cee49269370b0b3 - Patch
References () https://git.kernel.org/stable/c/42f79dbb9514f726ff21df25f09cb0693b0b2445 - () https://git.kernel.org/stable/c/42f79dbb9514f726ff21df25f09cb0693b0b2445 - Patch
References () https://git.kernel.org/stable/c/49a6ffdaed60f0eb52c198fafebc05994e16e305 - () https://git.kernel.org/stable/c/49a6ffdaed60f0eb52c198fafebc05994e16e305 - Patch
References () https://git.kernel.org/stable/c/4ebba43384722adbd325baec3a12c572d94488eb - () https://git.kernel.org/stable/c/4ebba43384722adbd325baec3a12c572d94488eb - Patch
References () https://git.kernel.org/stable/c/6216b685b8f48ab7b721a6fd5acbf526b41c13e8 - () https://git.kernel.org/stable/c/6216b685b8f48ab7b721a6fd5acbf526b41c13e8 - Patch
References () https://git.kernel.org/stable/c/708b9abe1b4a2f050a483db4b7edfc446b13df1f - () https://git.kernel.org/stable/c/708b9abe1b4a2f050a483db4b7edfc446b13df1f - Patch
CWE CWE-125
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

17 Sep 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 15:15

Updated : 2026-01-14 19:16


NVD link : CVE-2022-50366

Mitre link : CVE-2022-50366

CVE.ORG link : CVE-2022-50366


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read