๐Ÿ” CVE Alert

CVE-2024-57973

UNKNOWN 0.0

rdma/cxgb4: Prevent potential integer overflow on 32bit

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" variable is controlled by the user. It comes from process_responses(). On 32bit systems, the "gl->tot_len + sizeof(struct cpl_pass_accept_req) + sizeof(struct rss_header)" addition could have an integer wrapping bug. Use size_add() to prevent this.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1cab775c3e75f1250c965feafd061d696df36e53 < 2b759f78b83221f4a1cae3aeb20b500e375f3ee6 1cab775c3e75f1250c965feafd061d696df36e53 < d64148a10a85952352de6091ceed99fb9ce2d3ee 1cab775c3e75f1250c965feafd061d696df36e53 < e53ca458f543aa352d09b484550de173cb9085c2 1cab775c3e75f1250c965feafd061d696df36e53 < 4422f452d028850b9cc4fd8f1cf45a8ff91855eb 1cab775c3e75f1250c965feafd061d696df36e53 < de8d88b68d0cfd41152a7a63d6aec0ed3e1b837a 1cab775c3e75f1250c965feafd061d696df36e53 < dd352107f22bfbecbbf3b74bde14f3f932296309 1cab775c3e75f1250c965feafd061d696df36e53 < aeb814484387811b3579d5c78ad4eb301e3bf1c8 1cab775c3e75f1250c965feafd061d696df36e53 < bd96a3935e89486304461a21752f824fc25e0f0b
Linux / Linux
3.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2b759f78b83221f4a1cae3aeb20b500e375f3ee6 git.kernel.org: https://git.kernel.org/stable/c/d64148a10a85952352de6091ceed99fb9ce2d3ee git.kernel.org: https://git.kernel.org/stable/c/e53ca458f543aa352d09b484550de173cb9085c2 git.kernel.org: https://git.kernel.org/stable/c/4422f452d028850b9cc4fd8f1cf45a8ff91855eb git.kernel.org: https://git.kernel.org/stable/c/de8d88b68d0cfd41152a7a63d6aec0ed3e1b837a git.kernel.org: https://git.kernel.org/stable/c/dd352107f22bfbecbbf3b74bde14f3f932296309 git.kernel.org: https://git.kernel.org/stable/c/aeb814484387811b3579d5c78ad4eb301e3bf1c8 git.kernel.org: https://git.kernel.org/stable/c/bd96a3935e89486304461a21752f824fc25e0f0b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html