CVE-2022-49698
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
24/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: use get_random_u32 instead of prandom<br />
<br />
bh might occur while updating per-cpu rnd_state from user context,<br />
ie. local_out path.<br />
<br />
BUG: using smp_processor_id() in preemptible [00000000] code: nginx/2725<br />
caller is nft_ng_random_eval+0x24/0x54 [nft_numgen]<br />
Call Trace:<br />
check_preemption_disabled+0xde/0xe0<br />
nft_ng_random_eval+0x24/0x54 [nft_numgen]<br />
<br />
Use the random driver instead, this also avoids need for local prandom<br />
state. Moreover, prandom now uses the random driver since d4150779e60f<br />
("random32: use real rng for non-deterministic randomness").<br />
<br />
Based on earlier patch from Pablo Neira.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.18 (including) | 5.10.127 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.51 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



