CVE-2025-68731
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array()<br />
<br />
The unpublished smatch static checker reported a warning.<br />
<br />
drivers/accel/amdxdna/aie2_pci.c:904 aie2_query_ctx_status_array()<br />
warn: potential user controlled sizeof overflow<br />
&#39;args->num_element * args->element_size&#39; &#39;1-u32max(user) * 1-u32max(user)&#39;<br />
<br />
Even this will not cause a real issue, it is better to put a reasonable<br />
limitation for element_size and num_element. Add condition to make sure<br />
the input element_size



