In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/qm - increase the memory of local variables
Increase the buffer to prevent stack overflow by fuzz test. The maximum
length of the qos configuration buffer is 256 bytes. Currently, the value
of the 'val buffer' is only 32 bytes. The sscanf does not check the dest
memory length. So the 'val buffer' may stack overflow.
Metrics
Affected Vendors & Products
References
History
Fri, 19 Sep 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Fri, 19 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 18 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - increase the memory of local variables Increase the buffer to prevent stack overflow by fuzz test. The maximum length of the qos configuration buffer is 256 bytes. Currently, the value of the 'val buffer' is only 32 bytes. The sscanf does not check the dest memory length. So the 'val buffer' may stack overflow. | |
Title | crypto: hisilicon/qm - increase the memory of local variables | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-09-29T10:47:33.423Z
Reserved: 2025-09-17T14:53:07.001Z
Link: CVE-2022-50407

No data.

Status : Awaiting Analysis
Published: 2025-09-18T16:15:43.880
Modified: 2025-09-19T16:00:27.847
Link: CVE-2022-50407


Updated: 2025-09-19T09:35:40Z