First published: Tue Dec 24 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.