๐Ÿ” CVE Alert

CVE-2024-58017

UNKNOWN 0.0

printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX Shifting 1 << 31 on a 32-bit int causes signed integer overflow, which leads to undefined behavior. To prevent this, cast 1 to u32 before performing the shift, ensuring well-defined behavior. This change explicitly avoids any potential overflow by ensuring that the shift occurs on an unsigned 32-bit integer.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < 54c14022fa2ba427dc543455c2cf9225903a7174 e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < dfb7b179741ee09506dc7719d92f9e1cea01f10e e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < bb8ff054e19fe27f4e5eaac1b05e462894cfe9b1 e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < 9a6d43844de2479a3ff8d674c3e2a16172e01598 e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < 4acf6bab775dbd22a9a799030a808a7305e01d63 e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < 404e5fd918a0b14abec06c7eca128f04c9b98e41 e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < 4a2c4e7265b8eed83c25d86d702cea06493cab18 e6fe3e5b7d16e8f146a4ae7fe481bc6e97acde1e < 3d6f83df8ff2d5de84b50377e4f0d45e25311c7a 55b2c1ccb82143be1ed9e1922976dbe63917fe68 089d475a4cdb5848998b3cb37e545413ed054784 695583334b6b7f82c39ee124edfbfa48145ed571 3404019d6d0f4c0108b77d44e97e2e39ca937e6f
Linux / Linux
4.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/54c14022fa2ba427dc543455c2cf9225903a7174 git.kernel.org: https://git.kernel.org/stable/c/dfb7b179741ee09506dc7719d92f9e1cea01f10e git.kernel.org: https://git.kernel.org/stable/c/bb8ff054e19fe27f4e5eaac1b05e462894cfe9b1 git.kernel.org: https://git.kernel.org/stable/c/9a6d43844de2479a3ff8d674c3e2a16172e01598 git.kernel.org: https://git.kernel.org/stable/c/4acf6bab775dbd22a9a799030a808a7305e01d63 git.kernel.org: https://git.kernel.org/stable/c/404e5fd918a0b14abec06c7eca128f04c9b98e41 git.kernel.org: https://git.kernel.org/stable/c/4a2c4e7265b8eed83c25d86d702cea06493cab18 git.kernel.org: https://git.kernel.org/stable/c/3d6f83df8ff2d5de84b50377e4f0d45e25311c7a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html