In the Linux kernel, the following vulnerability has been resolved:
accel/amdxdna: Fix an integer overflow in aie2queryctxstatusarray()
The unpublished smatch static checker reported a warning.
drivers/accel/amdxdna/aie2pci.c:904 aie2queryctxstatusarray() warn: potential user controlled sizeof overflow 'args->numelement * args->element_size' '1-u32max(user) * 1-u32max(user)'
Even this will not cause a real issue, it is better to put a reasonable limitation for elementsize and numelement. Add condition to make sure the input elementsize <= 4K and numelement <= 1K.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68731.json"
}