In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - add param check for RSA
Reject requests with a source buffer that is bigger than the size of the
key. This is to prevent a possible integer underflow that might happen
when copying the source scatterlist into a linear buffer.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    10 Mar 2025, 21:28
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| References | () https://git.kernel.org/stable/c/4d6d2adce08788b7667a6e58002682ea1bbf6a79 - Patch | |
| References | () https://git.kernel.org/stable/c/9714061423b8b24b8afb31b8eb4df977c63f19c4 - Patch | |
| References | () https://git.kernel.org/stable/c/f993321e50ba7a8ba4f5b19939e1772a921a1c42 - Patch | |
| First Time | 
        
        Linux
         Linux linux Kernel  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.5  | 
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | CWE-191 | 
26 Feb 2025, 07:01
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-26 07:01
Updated : 2025-10-01 20:16
NVD link : CVE-2022-49563
Mitre link : CVE-2022-49563
CVE.ORG link : CVE-2022-49563
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-191
                        
            Integer Underflow (Wrap or Wraparound)
