In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - add param check for DH
Reject requests with a source buffer that is bigger than the size of the
key. This is to prevent a possible integer underflow that might happen
when copying the source scatterlist into a linear buffer.
References
Configurations
Configuration 1 (hide)
|
History
10 Mar 2025, 21:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/2acbb8771f6ac82422886e63832ee7a0f4b1635b - Patch | |
References | () https://git.kernel.org/stable/c/76c9216833e7c20a67c987cf89719a3f01666aaa - Patch | |
References | () https://git.kernel.org/stable/c/e7f979ed51f96495328157df663c835b17db1e30 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux
Linux linux Kernel |
|
Summary |
|
|
CWE | CWE-191 |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-10 21:19
NVD link : CVE-2022-49564
Mitre link : CVE-2022-49564
CVE.ORG link : CVE-2022-49564
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)