Количество 12
Количество 12

BDU:2024-02026
Уязвимость функции qcom_rng_read() компонента qcom-rng.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2022-48630
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.

CVE-2022-48630
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.

CVE-2022-48630
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.
CVE-2022-48630
In the Linux kernel, the following vulnerability has been resolved: c ...
GHSA-4rpf-4vmp-3hfw
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.

ROS-20240821-02
Множественные уязвимости kernel-lt

SUSE-SU-2024:1321-1
Security update for the Linux Kernel

SUSE-SU-2024:1466-1
Security update for the Linux Kernel

SUSE-SU-2024:1322-1
Security update for the Linux Kernel

SUSE-SU-2024:1480-1
Security update for the Linux Kernel

SUSE-SU-2024:1490-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-02026 Уязвимость функции qcom_rng_read() компонента qcom-rng.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.4 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-48630 In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2022-48630 In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor. | CVSS3: 4.4 | 0% Низкий | больше 1 года назад |
![]() | CVE-2022-48630 In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
CVE-2022-48630 In the Linux kernel, the following vulnerability has been resolved: c ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
GHSA-4rpf-4vmp-3hfw In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
![]() | ROS-20240821-02 Множественные уязвимости kernel-lt | CVSS3: 9.8 | 10 месяцев назад | |
![]() | SUSE-SU-2024:1321-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1466-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1322-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1480-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1490-1 Security update for the Linux Kernel | около 1 года назад |
Уязвимостей на страницу