{"id":"CVE-2022-48630","summary":"crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ\n\nThe commit referenced in the Fixes tag removed the 'break' from the else\nbranch in qcom_rng_read(), causing an infinite loop whenever 'max' is\nnot a multiple of WORD_SZ. This can be reproduced e.g. by running:\n\n    kcapi-rng -b 67 \u003e/dev/null\n\nThere are many ways to fix this without adding back the 'break', but\nthey all seem more awkward than simply adding it back, so do just that.\n\nTested on a machine with Qualcomm Amberwing processor.","modified":"2026-04-02T08:26:42.086508Z","published":"2024-03-05T11:18:07.394Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1490-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48630.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48630.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48630"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a8e32bbb96c25b7ab29b1894dcd45e0b3b08fd9d"},{"fixed":"71a89789552b7faf3ef27969b9bc783fa0df3550"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"184f7bd08ce56f003530fc19f160d54e75bf5c9d"},{"fixed":"8be06f62b426801dba43ddf8893952a0e62ab6ae"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0f9b7b8df17525e464294c916acc8194ce38446b"},{"fixed":"233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ab9337c7cb6f875b6286440b1adfbeeef2b2b2bd"},{"fixed":"8a06f25f5941c145773204f2f7abef95b4ffb8ce"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a680b1832ced3b5fa7c93484248fd221ea0d614b"},{"fixed":"05d4d17475d8d094c519bb51658bc47899c175e3"},{"fixed":"16287397ec5c08aa58db6acf7dbc55470d78087d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"485995cbc98a4f77cfd4f8ed4dd7ff8ab262964d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48630.json"}}],"schema_version":"1.7.5"}