Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: hwrng: core - Fix page fault dead lock on mmap-ed hwrng There is a dead-lock in the hwrng device read path. This triggers when the user reads from /dev/hwrng into memory also mmap-ed from /dev/hwrng. The resulting page fault triggers a recursive read which then dead-locks. Fix this by using a stack buffer when calling copy_to_user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.33, < 4.19.307 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0Patch
- https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48Patch
- https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029Patch
- https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922Patch
- https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839ePatch
- https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693cPatch
- https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990Patch
- https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170dPatch
- https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0Patch
- https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48Patch
- https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029Patch
- https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922Patch
- https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839ePatch
- https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693cPatch
- https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990Patch
FAQ
What is CVE-2023-52615?
CVE-2023-52615 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: hwrng: core - Fix page fault dead lock on mmap-ed hwrng There is a dead-lock in the hwrng device read path. This triggers when th...
How severe is CVE-2023-52615?
CVE-2023-52615 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-52615?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.