In the Linux kernel, the following vulnerability has been resolved: crypto: qat - add param check for DH Reject requests with a source buffer that is bigger than the size of the key. This is to prevent a possible integer underflow that might happen when copying the source scatterlist into a linear buffer.
https://git.kernel.org/stable/c/e7f979ed51f96495328157df663c835b17db1e30
https://git.kernel.org/stable/c/76c9216833e7c20a67c987cf89719a3f01666aaa
https://git.kernel.org/stable/c/2acbb8771f6ac82422886e63832ee7a0f4b1635b