CVE-2022-48630: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.
AI Analysis
Technical Summary
CVE-2022-48630 is a vulnerability identified in the Linux kernel's Qualcomm random number generator (qcom-rng) driver. The issue arises from a logic error introduced by a commit that removed a 'break' statement from the else branch in the qcom_rng_read() function. This removal causes the function to enter an infinite loop when the requested number of bytes ('max') is not a multiple of the system's word size (WORD_SZ). The infinite loop can be triggered by user-space applications making specific requests to the random number generator, such as invoking 'kcapi-rng -b 67'. The root cause is a control flow flaw that prevents the function from exiting correctly under certain input conditions. The vulnerability was tested on Qualcomm Amberwing processors, which are commonly used in embedded and mobile devices. The fix involves restoring the 'break' statement to ensure proper loop termination. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating a range of affected kernel builds. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability impacts the availability of the random number generator service by causing it to hang indefinitely, potentially leading to denial of service conditions in affected systems.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability of systems running affected Linux kernel versions on Qualcomm-based hardware. Since the qcom-rng driver is responsible for providing entropy to cryptographic operations, an infinite loop could stall processes relying on randomness, potentially causing system hangs or degraded performance. This can impact embedded systems, IoT devices, and mobile infrastructure that use Qualcomm processors and Linux kernels with the vulnerable driver. Critical infrastructure relying on such devices for secure communications or cryptographic functions could experience service disruptions. Although the vulnerability does not directly expose confidentiality or integrity risks, the denial of service effect could indirectly impact business operations, especially in sectors like telecommunications, manufacturing, and automotive industries where Qualcomm processors are prevalent. The lack of known exploits reduces immediate risk, but the ease of triggering the infinite loop via user-space commands suggests that local attackers or malicious software could exploit this flaw to degrade system availability.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions by applying the fix that restores the 'break' statement in the qcom_rng_read() function. Kernel updates from trusted Linux distributions or direct kernel source patches should be deployed promptly on all Qualcomm-based devices. For embedded and IoT devices where kernel updates are challenging, organizations should consider implementing runtime monitoring to detect and recover from hung processes related to the RNG service. Limiting access to the random number generator device node (/dev/hwrng or equivalent) to trusted users and processes can reduce the risk of exploitation. Additionally, organizations should audit their device inventory to identify systems using Qualcomm Amberwing or similar processors with vulnerable kernels and prioritize remediation accordingly. Network segmentation and application whitelisting can help contain potential denial of service impacts. Finally, organizations should monitor vendor advisories and Linux kernel mailing lists for any emerging exploit reports or additional patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2022-48630: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ The commit referenced in the Fixes tag removed the 'break' from the else branch in qcom_rng_read(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running: kcapi-rng -b 67 >/dev/null There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that. Tested on a machine with Qualcomm Amberwing processor.
AI-Powered Analysis
Technical Analysis
CVE-2022-48630 is a vulnerability identified in the Linux kernel's Qualcomm random number generator (qcom-rng) driver. The issue arises from a logic error introduced by a commit that removed a 'break' statement from the else branch in the qcom_rng_read() function. This removal causes the function to enter an infinite loop when the requested number of bytes ('max') is not a multiple of the system's word size (WORD_SZ). The infinite loop can be triggered by user-space applications making specific requests to the random number generator, such as invoking 'kcapi-rng -b 67'. The root cause is a control flow flaw that prevents the function from exiting correctly under certain input conditions. The vulnerability was tested on Qualcomm Amberwing processors, which are commonly used in embedded and mobile devices. The fix involves restoring the 'break' statement to ensure proper loop termination. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating a range of affected kernel builds. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability impacts the availability of the random number generator service by causing it to hang indefinitely, potentially leading to denial of service conditions in affected systems.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability of systems running affected Linux kernel versions on Qualcomm-based hardware. Since the qcom-rng driver is responsible for providing entropy to cryptographic operations, an infinite loop could stall processes relying on randomness, potentially causing system hangs or degraded performance. This can impact embedded systems, IoT devices, and mobile infrastructure that use Qualcomm processors and Linux kernels with the vulnerable driver. Critical infrastructure relying on such devices for secure communications or cryptographic functions could experience service disruptions. Although the vulnerability does not directly expose confidentiality or integrity risks, the denial of service effect could indirectly impact business operations, especially in sectors like telecommunications, manufacturing, and automotive industries where Qualcomm processors are prevalent. The lack of known exploits reduces immediate risk, but the ease of triggering the infinite loop via user-space commands suggests that local attackers or malicious software could exploit this flaw to degrade system availability.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions by applying the fix that restores the 'break' statement in the qcom_rng_read() function. Kernel updates from trusted Linux distributions or direct kernel source patches should be deployed promptly on all Qualcomm-based devices. For embedded and IoT devices where kernel updates are challenging, organizations should consider implementing runtime monitoring to detect and recover from hung processes related to the RNG service. Limiting access to the random number generator device node (/dev/hwrng or equivalent) to trusted users and processes can reduce the risk of exploitation. Additionally, organizations should audit their device inventory to identify systems using Qualcomm Amberwing or similar processors with vulnerable kernels and prioritize remediation accordingly. Network segmentation and application whitelisting can help contain potential denial of service impacts. Finally, organizations should monitor vendor advisories and Linux kernel mailing lists for any emerging exploit reports or additional patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-25T13:44:28.315Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd4bd
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 11:54:51 PM
Last updated: 7/27/2025, 1:07:28 AM
Views: 10
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.