CVE-2022-48630

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/03/2024
Last modified:
03/02/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ<br /> <br /> The commit referenced in the Fixes tag removed the &amp;#39;break&amp;#39; from the else<br /> branch in qcom_rng_read(), causing an infinite loop whenever &amp;#39;max&amp;#39; is<br /> not a multiple of WORD_SZ. This can be reproduced e.g. by running:<br /> <br /> kcapi-rng -b 67 &gt;/dev/null<br /> <br /> There are many ways to fix this without adding back the &amp;#39;break&amp;#39;, but<br /> they all seem more awkward than simply adding it back, so do just that.<br /> <br /> Tested on a machine with Qualcomm Amberwing processor.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.236 (including) 4.19.245 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.187 (including) 5.4.196 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.108 (including) 5.10.118 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.31 (including) 5.15.42 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 5.17.10 (excluding)
cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*