
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49563 is a vulnerability discovered in the Linux kernel's crypto QAT (QuickAssist Technology) module. The vulnerability relates to insufficient parameter validation in RSA operations, where requests with a source buffer larger than the key size were not properly rejected. This could potentially lead to an integer underflow vulnerability when copying the source scatterlist into a linear buffer (Debian Tracker).
The vulnerability exists in the RSA implementation of the QAT crypto module where there was no validation to ensure that the source buffer size did not exceed the key size. The fix involves adding parameter checks in the qatrsaenc and qatrsadec functions to reject requests where req->srclen > ctx->keysz, returning -EINVAL in such cases (Kernel Commit).
If exploited, this vulnerability could lead to an integer underflow condition when copying the source scatterlist into a linear buffer, potentially causing memory corruption or system instability (Debian Tracker).
The vulnerability has been fixed in the Linux kernel by adding parameter validation checks. The fix was implemented in the kernel commit 9714061423b8b24b8afb31b8eb4df977c63f19c4. Various Linux distributions have incorporated this fix in their updates, including Debian bookworm (6.1.129-1) and later versions (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."