In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: fix memory corruption on probe Add the missing sanity check on the probed-session count to avoid corrupting memory beyond the fixed-size slab-allocated session array when there are more than FASTRPC_MAX_SESSIONS sessions defined in the devicetree.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025061810-CVE-2022-49952-0994@gregkh/T