In the Linux kernel, the following vulnerability has been resolved:
crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
The commit referenced in the Fixes tag removed the 'break' from the else
branch in qcom_rng_read(), causing an infinite loop whenever 'max' is
not a multiple of WORD_SZ. This can be reproduced e.g. by running:
kcapi-rng -b 67 >/dev/null
There are many ways to fix this without adding back the 'break', but
they all seem more awkward than simply adding it back, so do just that.
Tested on a machine with Qualcomm Amberwing processor.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Feb 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:* |
|
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 05 Nov 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-03-05T11:18:07.394Z
Updated: 2024-12-19T08:04:39.639Z
Reserved: 2024-02-25T13:44:28.315Z
Link: CVE-2022-48630

Updated: 2024-08-03T15:17:55.579Z

Status : Analyzed
Published: 2024-03-05T12:15:45.780
Modified: 2025-02-03T14:09:55.317
Link: CVE-2022-48630
