In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - add param check for RSA
Reject requests with a source buffer that is bigger than the size of the key. This is to prevent a possible integer underflow that might happen when copying the source scatterlist into a linear buffer.
[
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-1cd36f12",
"digest": {
"function_hash": "7652968482763764774325528310947476146",
"length": 3950.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4d6d2adce08788b7667a6e58002682ea1bbf6a79",
"signature_type": "Function",
"target": {
"function": "qat_rsa_dec",
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-77d5d6cf",
"digest": {
"function_hash": "7652968482763764774325528310947476146",
"length": 3950.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9714061423b8b24b8afb31b8eb4df977c63f19c4",
"signature_type": "Function",
"target": {
"function": "qat_rsa_dec",
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-a4686a4a",
"digest": {
"line_hashes": [
"66335057172224355434434433347165410467",
"334063900171710527863412832469205462659",
"207015825881991613455561903920138494230",
"134763806524708669490336608397911716117",
"66335057172224355434434433347165410467",
"334063900171710527863412832469205462659",
"207015825881991613455561903920138494230",
"134763806524708669490336608397911716117"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f993321e50ba7a8ba4f5b19939e1772a921a1c42",
"signature_type": "Line",
"target": {
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-aef3499c",
"digest": {
"line_hashes": [
"66335057172224355434434433347165410467",
"334063900171710527863412832469205462659",
"207015825881991613455561903920138494230",
"134763806524708669490336608397911716117",
"66335057172224355434434433347165410467",
"334063900171710527863412832469205462659",
"207015825881991613455561903920138494230",
"134763806524708669490336608397911716117"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9714061423b8b24b8afb31b8eb4df977c63f19c4",
"signature_type": "Line",
"target": {
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-bd31f803",
"digest": {
"function_hash": "173805057756573978032944248487113652368",
"length": 3498.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f993321e50ba7a8ba4f5b19939e1772a921a1c42",
"signature_type": "Function",
"target": {
"function": "qat_rsa_enc",
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-e55acbfa",
"digest": {
"function_hash": "173805057756573978032944248487113652368",
"length": 3498.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9714061423b8b24b8afb31b8eb4df977c63f19c4",
"signature_type": "Function",
"target": {
"function": "qat_rsa_enc",
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-f041879e",
"digest": {
"function_hash": "173805057756573978032944248487113652368",
"length": 3498.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4d6d2adce08788b7667a6e58002682ea1bbf6a79",
"signature_type": "Function",
"target": {
"function": "qat_rsa_enc",
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-f21179d1",
"digest": {
"function_hash": "7652968482763764774325528310947476146",
"length": 3950.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f993321e50ba7a8ba4f5b19939e1772a921a1c42",
"signature_type": "Function",
"target": {
"function": "qat_rsa_dec",
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49563-f84aee65",
"digest": {
"line_hashes": [
"66335057172224355434434433347165410467",
"334063900171710527863412832469205462659",
"207015825881991613455561903920138494230",
"134763806524708669490336608397911716117",
"66335057172224355434434433347165410467",
"334063900171710527863412832469205462659",
"207015825881991613455561903920138494230",
"134763806524708669490336608397911716117"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4d6d2adce08788b7667a6e58002682ea1bbf6a79",
"signature_type": "Line",
"target": {
"file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
}
}
]