Bug 2347983 (CVE-2022-49698) - CVE-2022-49698 kernel: netfilter: use get_random_u32 instead of prandom
Summary: CVE-2022-49698 kernel: netfilter: use get_random_u32 instead of prandom
Keywords:
Status: NEW
Alias: CVE-2022-49698
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-26 03:13 UTC by OSIDB Bzimport
Modified: 2025-02-27 09:08 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-26 03:13:33 UTC
In the Linux kernel, the following vulnerability has been resolved:

netfilter: use get_random_u32 instead of prandom

bh might occur while updating per-cpu rnd_state from user context,
ie. local_out path.

BUG: using smp_processor_id() in preemptible [00000000] code: nginx/2725
caller is nft_ng_random_eval+0x24/0x54 [nft_numgen]
Call Trace:
 check_preemption_disabled+0xde/0xe0
 nft_ng_random_eval+0x24/0x54 [nft_numgen]

Use the random driver instead, this also avoids need for local prandom
state. Moreover, prandom now uses the random driver since d4150779e60f
("random32: use real rng for non-deterministic randomness").

Based on earlier patch from Pablo Neira.

Comment 1 Avinash Hanwate 2025-02-26 21:18:53 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49698-9ddd@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.