In the Linux kernel, the following vulnerability has been resolved:
crypto: qat/qat420xx - fix off by one in uofget_name()
This is called from uofgetname420xx() where "numobjs" is the ARRAYSIZE() of fwobjs[]. The > needs to be >= to prevent an out of bounds access.