CVE-2022-49698
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved:
netfilter: use get_random_u32 instead of prandom
bh might occur while updating per-cpu rnd_state from user context,
ie. local_out path.
BUG: using smp_processor_id() in preemptible [00000000] code: nginx/2725
caller is nft_ng_random_eval+0x24/0x54 [nft_numgen]
Call Trace:
check_preemption_disabled+0xde/0xe0
nft_ng_random_eval+0x24/0x54 [nft_numgen]
Use the random driver instead, this also avoids need for local prandom
state. Moreover, prandom now uses the random driver since d4150779e60f
("random32: use real rng for non-deterministic randomness").
Based on earlier patch from Pablo Neira.Enginsight| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.18 ≤ 𝑥 < 5.10.127 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.51 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.18.8 |
| linux | linux_kernel | 5.19:rc1 |
| linux | linux_kernel | 5.19:rc2 |
| linux | linux_kernel | 5.19:rc3 |
𝑥
= Vulnerable software versions
Debian Releases