Home

Description

In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array() The unpublished smatch static checker reported a warning. drivers/accel/amdxdna/aie2_pci.c:904 aie2_query_ctx_status_array() warn: potential user controlled sizeof overflow 'args->num_element * args->element_size' '1-u32max(user) * 1-u32max(user)' Even this will not cause a real issue, it is better to put a reasonable limitation for element_size and num_element. Add condition to make sure the input element_size <= 4K and num_element <= 1K.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

2f509fe6a42cda845890273fe759fb7ba9edad97 (git) before 359653edd5374fbba28f93043554dcc494aee85f
affected

2f509fe6a42cda845890273fe759fb7ba9edad97 (git) before 9e16c8bf9aebf629344cfd4cd5e3dc7d8c3f7d82
affected

Default status
affected

6.18
affected

Any version before 6.18
unaffected

6.18.2 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/359653edd5374fbba28f93043554dcc494aee85f

git.kernel.org/...c/9e16c8bf9aebf629344cfd4cd5e3dc7d8c3f7d82

cve.org (CVE-2025-68731)

nvd.nist.gov (CVE-2025-68731)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.