In the Linux kernel, the following vulnerability has been resolved:
cpufreq: CPPC: Add u64 casts to avoid overflowing
The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/cpufreq/cppc_cpufreq.c" }, "id": "CVE-2022-49750-5a129b81", "digest": { "line_hashes": [ "23324669390543597511384000036792044834", "104643167321500129206988767080794316779", "246336817724856398045931376089243449093", "195862552008781943186616338342982002467", "142310333691679622613158372583466402309", "190765702624270982750420867790897196031", "164443570711421050815208320999142637504", "184158975526722993694210201123089612610", "288735957635840939744149494905982273339", "157495372260830690980141291565743111777" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5f94b9c8b805d87ff185caf9779c3a4d07819e3" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/cpufreq/cppc_cpufreq.c" }, "id": "CVE-2022-49750-70ceacd3", "digest": { "line_hashes": [ "23324669390543597511384000036792044834", "104643167321500129206988767080794316779", "246336817724856398045931376089243449093", "195862552008781943186616338342982002467", "142310333691679622613158372583466402309", "190765702624270982750420867790897196031", "164443570711421050815208320999142637504", "184158975526722993694210201123089612610", "288735957635840939744149494905982273339", "157495372260830690980141291565743111777" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/cpufreq/cppc_cpufreq.c", "function": "cppc_get_cpu_power" }, "id": "CVE-2022-49750-7690e10e", "digest": { "length": 1160.0, "function_hash": "333885165231787354546846718155210956599" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5f94b9c8b805d87ff185caf9779c3a4d07819e3" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/cpufreq/cppc_cpufreq.c", "function": "get_perf_level_count" }, "id": "CVE-2022-49750-84257e8c", "digest": { "length": 386.0, "function_hash": "50111303592112830820751047870266886296" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/cpufreq/cppc_cpufreq.c", "function": "get_perf_level_count" }, "id": "CVE-2022-49750-b06bbca9", "digest": { "length": 386.0, "function_hash": "50111303592112830820751047870266886296" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5f94b9c8b805d87ff185caf9779c3a4d07819e3" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/cpufreq/cppc_cpufreq.c", "function": "cppc_get_cpu_power" }, "id": "CVE-2022-49750-b2934ed2", "digest": { "length": 1160.0, "function_hash": "333885165231787354546846718155210956599" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045" } ] }