CVE-2022-49563

In the Linux kernel, the following vulnerability has been resolved: crypto: qat - add param check for RSA Reject requests with a source buffer that is bigger than the size of the key. This is to prevent a possible integer underflow that might happen when copying the source scatterlist into a linear buffer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Mar 2025, 21:28

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - añadir comprobación de parámetros para solicitudes de rechazo RSA con un búfer de origen que sea más grande que el tamaño de la clave. Esto es para evitar un posible desbordamiento de enteros que podría ocurrir al copiar la lista de dispersión de origen en un búfer lineal.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/4d6d2adce08788b7667a6e58002682ea1bbf6a79 - () https://git.kernel.org/stable/c/4d6d2adce08788b7667a6e58002682ea1bbf6a79 - Patch
References () https://git.kernel.org/stable/c/9714061423b8b24b8afb31b8eb4df977c63f19c4 - () https://git.kernel.org/stable/c/9714061423b8b24b8afb31b8eb4df977c63f19c4 - Patch
References () https://git.kernel.org/stable/c/f993321e50ba7a8ba4f5b19939e1772a921a1c42 - () https://git.kernel.org/stable/c/f993321e50ba7a8ba4f5b19939e1772a921a1c42 - Patch
CWE CWE-191

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-10 21:28


NVD link : CVE-2022-49563

Mitre link : CVE-2022-49563

CVE.ORG link : CVE-2022-49563


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)