CVE-2022-49698

Source
https://cve.org/CVERecord?id=CVE-2022-49698
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49698.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49698
Downstream
Published
2025-02-26T02:24:19.519Z
Modified
2026-04-11T12:44:23.937927Z
Summary
netfilter: use get_random_u32 instead of prandom
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: use getrandomu32 instead of prandom

bh might occur while updating per-cpu rndstate from user context, ie. localout path.

BUG: using smpprocessorid() in preemptible [00000000] code: nginx/2725 caller is nftngrandomeval+0x24/0x54 [nftnumgen] Call Trace: checkpreemptiondisabled+0xde/0xe0 nftngrandomeval+0x24/0x54 [nftnumgen]

Use the random driver instead, this also avoids need for local prandom state. Moreover, prandom now uses the random driver since d4150779e60f ("random32: use real rng for non-deterministic randomness").

Based on earlier patch from Pablo Neira.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49698.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
978d8f9055c3a7c35db2ac99cd2580b993396e33
Fixed
15cc30ac2a8d7185f8ebf97dd1ddd90a7c79783b
Fixed
d0906b0fffc9f19bc42708ca3e84e2089088386c
Fixed
6ce71f83f798be7e1ca68707fec449fbecb38852
Fixed
b1fd94e704571f98b21027340eecf821b2bdffba

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49698.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.10.127
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.51
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49698.json"