In the Linux kernel, the following vulnerability has been...
Moderate severity
Unreviewed
Published
Feb 27, 2025
to the GitHub Advisory Database
•
Updated Mar 6, 2025
Description
Published by the National Vulnerability Database
Feb 27, 2025
Published to the GitHub Advisory Database
Feb 27, 2025
Last updated
Mar 6, 2025
In the Linux kernel, the following vulnerability has been resolved:
printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
Shifting 1 << 31 on a 32-bit int causes signed integer overflow, which
leads to undefined behavior. To prevent this, cast 1 to u32 before
performing the shift, ensuring well-defined behavior.
This change explicitly avoids any potential overflow by ensuring that
the shift occurs on an unsigned 32-bit integer.
References