In the Linux kernel, the following vulnerability has been resolved:
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
There is a dead-lock in the hwrng device read path. This triggers
when the user reads from /dev/hwrng into memory also mmap-ed from
/dev/hwrng. The resulting page fault triggers a recursive read
which then dead-locks.
Fix this by using a stack buffer when calling copy_to_user.
References
Configurations
Configuration 1 (hide)
|
History
12 Dec 2024, 15:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-667 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0 - Patch | |
References | () https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48 - Patch | |
References | () https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029 - Patch | |
References | () https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922 - Patch | |
References | () https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839e - Patch | |
References | () https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693c - Patch | |
References | () https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990 - Patch | |
References | () https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170d - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Patch |
Information
Published : 2024-03-18 11:15
Updated : 2024-12-12 15:20
NVD link : CVE-2023-52615
Mitre link : CVE-2023-52615
CVE.ORG link : CVE-2023-52615
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking