Description
In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array() The unpublished smatch static checker reported a warning. drivers/accel/amdxdna/aie2_pci.c:904 aie2_query_ctx_status_array() warn: potential user controlled sizeof overflow 'args->num_element * args->element_size' '1-u32max(user) * 1-u32max(user)' Even this will not cause a real issue, it is better to put a reasonable limitation for element_size and num_element. Add condition to make sure the input element_size <= 4K and num_element <= 1K.
Product status
2f509fe6a42cda845890273fe759fb7ba9edad97 (git) before 359653edd5374fbba28f93043554dcc494aee85f
2f509fe6a42cda845890273fe759fb7ba9edad97 (git) before 9e16c8bf9aebf629344cfd4cd5e3dc7d8c3f7d82
6.18
Any version before 6.18
6.18.2 (semver)
6.19-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/359653edd5374fbba28f93043554dcc494aee85f
git.kernel.org/...c/9e16c8bf9aebf629344cfd4cd5e3dc7d8c3f7d82
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.