In the Linux kernel, the following vulnerability has been resolved:
virtio-blk: fix implicit overflow on virtio_max_dma_size
The following codes have an implicit conversion from size_t to u32:
(u32)max_size = (size_t)virtio_max_dma_size(vdev);
This may lead overflow, Ex (size_t)4G -> (u32)0. Once
virtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX
instead.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-21 16:15
Updated : 2025-09-23 19:36
NVD link : CVE-2023-52762
Mitre link : CVE-2023-52762
CVE.ORG link : CVE-2023-52762
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound
