In the Linux kernel, the following vulnerability has been resolved:
crypto: qat/qat_420xx - fix off by one in uof_get_name()
This is called from uof_get_name_420xx() where "num_objs" is the
ARRAY_SIZE() of fw_objs[]. The > needs to be >= to prevent an out of
bounds access.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Dec 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Dec 2024 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_420xx - fix off by one in uof_get_name() This is called from uof_get_name_420xx() where "num_objs" is the ARRAY_SIZE() of fw_objs[]. The > needs to be >= to prevent an out of bounds access. | |
Title | crypto: qat/qat_420xx - fix off by one in uof_get_name() | |
References |
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-12-24T11:29:19.315Z
Updated: 2024-12-24T11:29:19.315Z
Reserved: 2024-11-19T17:17:25.004Z
Link: CVE-2024-53163
Vulnrichment
No data.
NVD
Status : Received
Published: 2024-12-24T12:15:24.670
Modified: 2024-12-24T12:15:24.670
Link: CVE-2024-53163
Redhat