We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49750

cpufreq: CPPC: Add u64 casts to avoid overflowing



Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Add u64 casts to avoid overflowing The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f5f94b9c8b805d87ff185caf9779c3a4d07819e3
affected

Default status
affected

6.1.9
unaffected

6.2
unaffected

References

git.kernel.org/...c/7d596bbc66a52ff2c7a83d7e0ee840cb07e2a045

git.kernel.org/...c/f5f94b9c8b805d87ff185caf9779c3a4d07819e3

cve.org (CVE-2022-49750)

nvd.nist.gov (CVE-2022-49750)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49750

Support options

Helpdesk Chat, Email, Knowledgebase