In the Linux kernel, the following vulnerability has been resolved:
crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
The commit referenced in the Fixes tag removed the 'break' from the else branch in qcomrngread(), causing an infinite loop whenever 'max' is not a multiple of WORD_SZ. This can be reproduced e.g. by running:
kcapi-rng -b 67 >/dev/null
There are many ways to fix this without adding back the 'break', but they all seem more awkward than simply adding it back, so do just that.
Tested on a machine with Qualcomm Amberwing processor.
[
    {
        "id": "CVE-2022-48630-06daef39",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "function_hash": "18479009961544884226998988517199430992",
            "length": 544.0
        },
        "target": {
            "file": "drivers/crypto/qcom-rng.c",
            "function": "qcom_rng_read"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16287397ec5c08aa58db6acf7dbc55470d78087d"
    },
    {
        "id": "CVE-2022-48630-62436903",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "function_hash": "18479009961544884226998988517199430992",
            "length": 544.0
        },
        "target": {
            "file": "drivers/crypto/qcom-rng.c",
            "function": "qcom_rng_read"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@05d4d17475d8d094c519bb51658bc47899c175e3"
    },
    {
        "id": "CVE-2022-48630-6f08674c",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "122802971784755531238843432191132821762",
                "111450495339411996641902331534928506828",
                "248675817343875552633972743949584145851",
                "24704440542672298120803862159930644396"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/crypto/qcom-rng.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@05d4d17475d8d094c519bb51658bc47899c175e3"
    },
    {
        "id": "CVE-2022-48630-b25cf458",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "122802971784755531238843432191132821762",
                "111450495339411996641902331534928506828",
                "248675817343875552633972743949584145851",
                "24704440542672298120803862159930644396"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/crypto/qcom-rng.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16287397ec5c08aa58db6acf7dbc55470d78087d"
    }
]