CVE-2023-52615

In the Linux kernel, the following vulnerability has been resolved: hwrng: core - Fix page fault dead lock on mmap-ed hwrng There is a dead-lock in the hwrng device read path. This triggers when the user reads from /dev/hwrng into memory also mmap-ed from /dev/hwrng. The resulting page fault triggers a recursive read which then dead-locks. Fix this by using a stack buffer when calling copy_to_user.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

12 Dec 2024, 15:20

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0 - () https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0 - Patch
References () https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48 - () https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48 - Patch
References () https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029 - () https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029 - Patch
References () https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922 - () https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922 - Patch
References () https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839e - () https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839e - Patch
References () https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693c - () https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693c - Patch
References () https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990 - () https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990 - Patch
References () https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170d - () https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170d - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Patch

Information

Published : 2024-03-18 11:15

Updated : 2024-12-12 15:20


NVD link : CVE-2023-52615

Mitre link : CVE-2023-52615

CVE.ORG link : CVE-2023-52615


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking