5.5
CVE-2022-48630
- EPSS 0.01%
- Published 05.03.2024 12:15:45
- Last modified 03.02.2025 14:09:55
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Open
In the Linux kernel, the following vulnerability has been resolved:
crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
The commit referenced in the Fixes tag removed the 'break' from the else
branch in qcom_rng_read(), causing an infinite loop whenever 'max' is
not a multiple of WORD_SZ. This can be reproduced e.g. by running:
kcapi-rng -b 67 >/dev/null
There are many ways to fix this without adding back the 'break', but
they all seem more awkward than simply adding it back, so do just that.
Tested on a machine with Qualcomm Amberwing processor.Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.19.236 < 4.19.245
Linux ≫ Linux Kernel Version >= 5.4.187 < 5.4.196
Linux ≫ Linux Kernel Version >= 5.10.108 < 5.10.118
Linux ≫ Linux Kernel Version >= 5.15.31 < 5.15.42
Linux ≫ Linux Kernel Version >= 5.17 < 5.17.10
Linux ≫ Linux Kernel Version5.18 Updaterc1
Linux ≫ Linux Kernel Version5.18 Updaterc2
Linux ≫ Linux Kernel Version5.18 Updaterc3
Linux ≫ Linux Kernel Version5.18 Updaterc4
Linux ≫ Linux Kernel Version5.18 Updaterc5
Linux ≫ Linux Kernel Version5.18 Updaterc6
Linux ≫ Linux Kernel Version5.18 Updaterc7
Linux ≫ Linux Kernel Version5.18 Updaterc9
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.013 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.