In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/qm - increase the memory of local variables
Increase the buffer to prevent stack overflow by fuzz test. The maximum
length of the qos configuration buffer is 256 bytes. Currently, the value
of the 'val buffer' is only 32 bytes. The sscanf does not check the dest
memory length. So the 'val buffer' may stack overflow.
References
Configurations
Configuration 1 (hide)
|
History
11 Dec 2025, 15:01
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-674 | |
| References | () https://git.kernel.org/stable/c/34c4f8ad45b4ea814c7ecc3f23a2d292959d5a52 - Patch | |
| References | () https://git.kernel.org/stable/c/3efe90af4c0c46c58dba1b306de142827153d9c0 - Patch | |
| References | () https://git.kernel.org/stable/c/fc521abb6ee4b8f06fdfc52646140dab6a2ed334 - Patch |
18 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-18 16:15
Updated : 2025-12-11 15:01
NVD link : CVE-2022-50407
Mitre link : CVE-2022-50407
CVE.ORG link : CVE-2022-50407
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-674
Uncontrolled Recursion
