CVE-2023-54325 — Incorrect Calculation of Buffer Size in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix out-of-bounds read
When preparing an AER-CTR request, the driver copies the key provided by
the user into a data structure that is accessible by the firmware.
If the target device is QAT GEN4, the key size is rounded up by 16 since
a rounded up size is expected by the device.
If the key size is rounded up before the copy, the size used for copying
the key might be bigger than the size of the region containing…
Affected Packages4 packages
▶CVEListV5linux/linux67916c9516893528ecce060ada1f58af0ce33d93 — 7697139d5dfd491f4c495a914a1dd68f6e827a0f+4
🔴Vulnerability Details
3GHSA▶
GHSA-r67g-vmvr-rvjq: In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix out-of-bounds read
When preparing an AER-CTR request, the driv↗2025-12-30
OSV▶
CVE-2023-54325: In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix out-of-bounds read When preparing an AER-CTR request, the driver↗2025-12-30