In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.Referenceshttps://git.kernel.org/stable/c/05c9a7a5344425860202a8f3efea4d8ed2d10edbhttps://git.kernel.org/stable/c/e69d2845aaa080960f38761f78fd25aa856620c6https://git.kernel.org/stable/c/700852528fc5295897d6089eea0656d67f9b9d88https://git.kernel.org/stable/c/475b5098043eef6e72751aadeab687992a5b63d1