In the Linux kernel, the following vulnerability has been resolved:
rdma/cxgb4: Prevent potential integer overflow on 32bit
The "gl->totlen" variable is controlled by the user. It comes from processresponses(). On 32bit systems, the "gl->totlen + sizeof(struct cplpassacceptreq) + sizeof(struct rssheader)" addition could have an integer wrapping bug. Use sizeadd() to prevent this.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57973.json"
}