Description
In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check_add_overflow() to guard against potential integer overflows when adding the binary blob lengths and the size of an asymmetric_key_id structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a possible buffer overflow when copying data from potentially malicious X.509 certificate fields that can be arbitrarily large, such as ASN.1 INTEGER serial numbers, issuer names, etc.
Product status
7901c1a8effbe5f89673bfc09d6e37b8f334f1a7 (git) before c73be4f51eed98fa0c7c189db8f279e1c86bfbf7
7901c1a8effbe5f89673bfc09d6e37b8f334f1a7 (git) before 6af753ac5205115e6c310c8c4236c01b59a1c44f
7901c1a8effbe5f89673bfc09d6e37b8f334f1a7 (git) before b7090a5c153105b9fd221a5a81459ee8cd5babd6
7901c1a8effbe5f89673bfc09d6e37b8f334f1a7 (git) before df0845cf447ae1556c3440b8b155de0926cbaa56
3.18
Any version before 3.18
6.12.63 (semver)
6.17.13 (semver)
6.18.2 (semver)
6.19-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/c73be4f51eed98fa0c7c189db8f279e1c86bfbf7
git.kernel.org/...c/6af753ac5205115e6c310c8c4236c01b59a1c44f
git.kernel.org/...c/b7090a5c153105b9fd221a5a81459ee8cd5babd6
git.kernel.org/...c/df0845cf447ae1556c3440b8b155de0926cbaa56
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.