Описание
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-53162
- https://git.kernel.org/stable/c/05c9a7a5344425860202a8f3efea4d8ed2d10edb
- https://git.kernel.org/stable/c/475b5098043eef6e72751aadeab687992a5b63d1
- https://git.kernel.org/stable/c/700852528fc5295897d6089eea0656d67f9b9d88
- https://git.kernel.org/stable/c/e69d2845aaa080960f38761f78fd25aa856620c6
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
In the Linux kernel, the following vulnerability has been resolved: c ...
Уязвимость функции uof_get_name() драйвера QAT_4xxx (drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c) операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации.