In the Linux kernel, the following vulnerability has been resolved:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
The fw_objs[] array has "num_objs" elements so the > needs to be >= to
prevent an out of bounds read.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Dec 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Dec 2024 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read. | |
Title | crypto: qat/qat_4xxx - fix off by one in uof_get_name() | |
References |
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-12-24T11:29:10.439Z
Updated: 2024-12-24T11:29:10.439Z
Reserved: 2024-11-19T17:17:25.003Z
Link: CVE-2024-53162
Vulnrichment
No data.
NVD
Status : Received
Published: 2024-12-24T12:15:24.567
Modified: 2024-12-24T12:15:24.567
Link: CVE-2024-53162
Redhat