Home

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - increase the memory of local variables Increase the buffer to prevent stack overflow by fuzz test. The maximum length of the qos configuration buffer is 256 bytes. Currently, the value of the 'val buffer' is only 32 bytes. The sscanf does not check the dest memory length. So the 'val buffer' may stack overflow.

PUBLISHED Reserved 2025-09-17 | Published 2025-09-18 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

263c9959c9376ec0217d6adc61222a53469eed3c (git) before 34c4f8ad45b4ea814c7ecc3f23a2d292959d5a52
affected

263c9959c9376ec0217d6adc61222a53469eed3c (git) before fc521abb6ee4b8f06fdfc52646140dab6a2ed334
affected

263c9959c9376ec0217d6adc61222a53469eed3c (git) before 3efe90af4c0c46c58dba1b306de142827153d9c0
affected

Default status
affected

5.4
affected

Any version before 5.4
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/34c4f8ad45b4ea814c7ecc3f23a2d292959d5a52

git.kernel.org/...c/fc521abb6ee4b8f06fdfc52646140dab6a2ed334

git.kernel.org/...c/3efe90af4c0c46c58dba1b306de142827153d9c0

cve.org (CVE-2022-50407)

nvd.nist.gov (CVE-2022-50407)

Download JSON