CVE-2022-48630

MEDIUM

Linux Kernel < 4.19.245 - Infinite Loop

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 1.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-835
Status published
Products (7)
linux/Kernel < 4.19.245linux
linux/Kernel 4.20.0 - 5.4.196linux
linux/Kernel 5.11.0 - 5.15.42linux
linux/Kernel 5.16.0 - 5.17.10linux
linux/Kernel 5.5.0 - 5.10.118linux
linux/linux_kernel 5.18 rc1 (8 CPE variants)
linux/linux_kernel 4.19.236 - 4.19.245
Published Mar 05, 2024
Tracked Since Feb 18, 2026