We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_420xx - fix off by one in uof_get_name() This is called from uof_get_name_420xx() where "num_objs" is the ARRAY_SIZE() of fw_objs[]. The > needs to be >= to prevent an out of bounds access.
Reserved 2024-11-19 | Published 2024-12-24 | Updated 2025-01-20 | Assigner Linuxgit.kernel.org/...c/c23661a36eea840b657e485d48ed88b246da1bb8
git.kernel.org/...c/91eef1ad75f03d37dba926b73f9dd6f058bc4d58
git.kernel.org/...c/93a11608fb3720e1bc2b19a2649ac2b49cca1921
Support options