In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - add param check for RSA
Reject requests with a source buffer that is bigger than the size of the
key. This is to prevent a possible integer underflow that might happen
when copying the source scatterlist into a linear buffer.
References
Configurations
Configuration 1 (hide)
|
History
10 Mar 2025, 21:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/4d6d2adce08788b7667a6e58002682ea1bbf6a79 - Patch | |
References | () https://git.kernel.org/stable/c/9714061423b8b24b8afb31b8eb4df977c63f19c4 - Patch | |
References | () https://git.kernel.org/stable/c/f993321e50ba7a8ba4f5b19939e1772a921a1c42 - Patch | |
CWE | CWE-191 |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-10 21:28
NVD link : CVE-2022-49563
Mitre link : CVE-2022-49563
CVE.ORG link : CVE-2022-49563
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)