In the Linux kernel, the following vulnerability has been resolved:
cpufreq: CPPC: Add u64 casts to avoid overflowing
The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"23324669390543597511384000036792044834",
"104643167321500129206988767080794316779",
"246336817724856398045931376089243449093",
"195862552008781943186616338342982002467",
"142310333691679622613158372583466402309",
"190765702624270982750420867790897196031",
"164443570711421050815208320999142637504",
"184158975526722993694210201123089612610",
"288735957635840939744149494905982273339",
"157495372260830690980141291565743111777"
]
},
"target": {
"file": "drivers/cpufreq/cppc_cpufreq.c"
},
"signature_version": "v1",
"id": "CVE-2022-49750-5a129b81",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5f94b9c8b805d87ff185caf9779c3a4d07819e3"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"23324669390543597511384000036792044834",
"104643167321500129206988767080794316779",
"246336817724856398045931376089243449093",
"195862552008781943186616338342982002467",
"142310333691679622613158372583466402309",
"190765702624270982750420867790897196031",
"164443570711421050815208320999142637504",
"184158975526722993694210201123089612610",
"288735957635840939744149494905982273339",
"157495372260830690980141291565743111777"
]
},
"target": {
"file": "drivers/cpufreq/cppc_cpufreq.c"
},
"signature_version": "v1",
"id": "CVE-2022-49750-70ceacd3",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "333885165231787354546846718155210956599",
"length": 1160.0
},
"target": {
"file": "drivers/cpufreq/cppc_cpufreq.c",
"function": "cppc_get_cpu_power"
},
"signature_version": "v1",
"id": "CVE-2022-49750-7690e10e",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5f94b9c8b805d87ff185caf9779c3a4d07819e3"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "50111303592112830820751047870266886296",
"length": 386.0
},
"target": {
"file": "drivers/cpufreq/cppc_cpufreq.c",
"function": "get_perf_level_count"
},
"signature_version": "v1",
"id": "CVE-2022-49750-84257e8c",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "50111303592112830820751047870266886296",
"length": 386.0
},
"target": {
"file": "drivers/cpufreq/cppc_cpufreq.c",
"function": "get_perf_level_count"
},
"signature_version": "v1",
"id": "CVE-2022-49750-b06bbca9",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5f94b9c8b805d87ff185caf9779c3a4d07819e3"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "333885165231787354546846718155210956599",
"length": 1160.0
},
"target": {
"file": "drivers/cpufreq/cppc_cpufreq.c",
"function": "cppc_get_cpu_power"
},
"signature_version": "v1",
"id": "CVE-2022-49750-b2934ed2",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045"
}
]