In the Linux kernel, the following vulnerability has been resolved:crypto: qat/qat_420xx - fix off by one in uof_get_name()This is called from uof_get_name_420xx() where "num_objs" is theARRAY_SIZE() of fw_objs[]. The > needs to be >= to prevent an out ofbounds access.
No PoCs from references.
- https://github.com/fkie-cad/nvd-json-data-feeds