{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:31:43.178","vulnerabilities":[{"cve":{"id":"CVE-2023-54325","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-30T13:16:21.840","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - fix out-of-bounds read\n\nWhen preparing an AER-CTR request, the driver copies the key provided by\nthe user into a data structure that is accessible by the firmware.\nIf the target device is QAT GEN4, the key size is rounded up by 16 since\na rounded up size is expected by the device.\nIf the key size is rounded up before the copy, the size used for copying\nthe key might be bigger than the size of the region containing the key,\ncausing an out-of-bounds read.\n\nFix by doing the copy first and then update the keylen.\n\nThis is to fix the following warning reported by KASAN:\n\n\t[  138.150574] BUG: KASAN: global-out-of-bounds in qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]\n\t[  138.150641] Read of size 32 at addr ffffffff88c402c0 by task cryptomgr_test/2340\n\n\t[  138.150651] CPU: 15 PID: 2340 Comm: cryptomgr_test Not tainted 6.2.0-rc1+ #45\n\t[  138.150659] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.86B.0087.D13.2208261706 08/26/2022\n\t[  138.150663] Call Trace:\n\t[  138.150668]  <TASK>\n\t[  138.150922]  kasan_check_range+0x13a/0x1c0\n\t[  138.150931]  memcpy+0x1f/0x60\n\t[  138.150940]  qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]\n\t[  138.151006]  qat_alg_skcipher_init_sessions+0xc1/0x240 [intel_qat]\n\t[  138.151073]  crypto_skcipher_setkey+0x82/0x160\n\t[  138.151085]  ? prepare_keybuf+0xa2/0xd0\n\t[  138.151095]  test_skcipher_vec_cfg+0x2b8/0x800"},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\ncrypto: qat - corrección de lectura fuera de límites\n\nAl preparar una solicitud AER-CTR, el controlador copia la clave proporcionada por el usuario en una estructura de datos que es accesible por el firmware.\nSi el dispositivo de destino es QAT GEN4, el tamaño de la clave se redondea hacia arriba en 16 ya que el dispositivo espera un tamaño redondeado.\nSi el tamaño de la clave se redondea hacia arriba antes de la copia, el tamaño utilizado para copiar la clave podría ser mayor que el tamaño de la región que contiene la clave, causando una lectura fuera de límites.\n\nCorrección realizando primero la copia y luego actualizando el keylen.\n\nEsto es para corregir la siguiente advertencia reportada por KASAN:\n\n\t[  138.150574] BUG: KASAN: global-out-of-bounds en qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]\n\t[  138.150641] Lectura de tamaño 32 en la dirección ffffffff88c402c0 por la tarea cryptomgr_test/2340\n\n\t[  138.150651] CPU: 15 PID: 2340 Comm: cryptomgr_test No contaminado 6.2.0-rc1+ #45\n\t[  138.150659] Nombre del hardware: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.86B.0087.D13.2208261706 08/26/2022\n\t[  138.150663] Traza de llamada:\n\t[  138.150668] \n\t[  138.150922] kasan_check_range+0x13a/0x1c0\n\t[  138.150931] memcpy+0x1f/0x60\n\t[  138.150940] qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]\n\t[  138.151006] qat_alg_skcipher_init_sessions+0xc1/0x240 [intel_qat]\n\t[  138.151073] crypto_skcipher_setkey+0x82/0x160\n\t[  138.151085] ? prepare_keybuf+0xa2/0xd0\n\t[  138.151095] test_skcipher_vec_cfg+0x2b8/0x800"}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/2b1501f058245573a3aa6bf234d205dde1196184","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/7697139d5dfd491f4c495a914a1dd68f6e827a0f","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/dc3809f390357c8992f0a23083da934a20fef9af","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f6044cc3030e139f60c281386f28bda6e3049d66","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}