加密:qcom-rng - 修复请求不是 WORD_SZ 倍数的无限循环 (CVE-2022-48630)

admin 2024-03-08 11:19:52 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
加密:qcom-rng - 修复请求不是 WORD_SZ 倍数的无限循环 (CVE-2022-48630)

CVE编号

CVE-2022-48630

利用情况

暂无

补丁情况

N/A

披露时间

2024-03-05
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3
https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d
https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c
https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550
https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce
https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_10 linux * Up to (excluding) 4.19.249-1
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.120-1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 5.17.11-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0