CVE-2022-49698: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: netfilter: use get_random_u32 instead of prandom bh might occur while updating per-cpu rnd_state from user context, ie. local_out path. BUG: using smp_processor_id() in preemptible [00000000] code: nginx/2725 caller is nft_ng_random_eval+0x24/0x54 [nft_numgen] Call Trace: check_preemption_disabled+0xde/0xe0 nft_ng_random_eval+0x24/0x54 [nft_numgen] Use the random driver instead, this also avoids need for local prandom state. Moreover, prandom now uses the random driver since d4150779e60f ("random32: use real rng for non-deterministic randomness"). Based on earlier patch from Pablo Neira.
AI Analysis
Technical Summary
CVE-2022-49698 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically related to the use of random number generation functions within kernel code paths. The issue arises from the use of the prandom function, which maintains a per-CPU random state that can be updated from user context, such as the local_out path. This update can cause bottom halves (bh) to occur, leading to potential concurrency issues. The vulnerability is exemplified by a kernel BUG triggered when smp_processor_id() is called in preemptible code, as observed in the nft_ng_random_eval function within the nft_numgen module. The root cause is the unsafe use of prandom in contexts where preemption is enabled, which can lead to race conditions or inconsistent state. The fix involves replacing prandom with get_random_u32, which uses the kernel's random driver and avoids the need for local per-CPU prandom state. This change not only eliminates the concurrency risk but also aligns with prior improvements where prandom was updated to use the real random driver for non-deterministic randomness. The vulnerability does not have reported exploits in the wild and was published in early 2025. It affects Linux kernel versions identified by specific commit hashes, indicating a code-level flaw rather than a configuration or user-space issue. The vulnerability is technical and subtle, involving kernel preemption and random number generation synchronization, which are critical for kernel stability and security.
Potential Impact
For European organizations, the impact of CVE-2022-49698 primarily concerns the stability and security of Linux-based systems, especially those utilizing netfilter for packet filtering and firewall functionalities. Since Linux is widely deployed in servers, cloud infrastructure, networking equipment, and embedded devices across Europe, this vulnerability could lead to kernel crashes (denial of service) or unpredictable behavior in network packet processing. While there is no direct evidence of privilege escalation or remote code execution, kernel bugs can be leveraged in complex attack chains or cause service disruptions. Organizations relying on Linux for critical infrastructure, including telecommunications, finance, and government services, may experience operational impacts if vulnerable kernels are exploited or encounter instability. The lack of known exploits reduces immediate risk, but the vulnerability's nature suggests that attackers with kernel-level access or local user privileges could trigger system crashes or instability, potentially impacting availability and reliability of services.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch replacing prandom with get_random_u32 in the netfilter subsystem. Since the vulnerability involves kernel code, applying official kernel updates from trusted Linux distributions is the most effective mitigation. For environments where immediate patching is challenging, organizations should audit and restrict local user access to systems running vulnerable kernels to reduce the risk of exploitation. Monitoring kernel logs for BUG messages related to smp_processor_id() or nft_ng_random_eval can help detect attempts to trigger the issue. Additionally, organizations should review their use of nftables and netfilter configurations to ensure they follow best practices and minimize exposure. For embedded or specialized devices, coordination with vendors to obtain patched firmware or kernel versions is critical. Finally, integrating this vulnerability into vulnerability management and patching workflows will ensure timely remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland, Poland, Belgium
CVE-2022-49698: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: use get_random_u32 instead of prandom bh might occur while updating per-cpu rnd_state from user context, ie. local_out path. BUG: using smp_processor_id() in preemptible [00000000] code: nginx/2725 caller is nft_ng_random_eval+0x24/0x54 [nft_numgen] Call Trace: check_preemption_disabled+0xde/0xe0 nft_ng_random_eval+0x24/0x54 [nft_numgen] Use the random driver instead, this also avoids need for local prandom state. Moreover, prandom now uses the random driver since d4150779e60f ("random32: use real rng for non-deterministic randomness"). Based on earlier patch from Pablo Neira.
AI-Powered Analysis
Technical Analysis
CVE-2022-49698 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically related to the use of random number generation functions within kernel code paths. The issue arises from the use of the prandom function, which maintains a per-CPU random state that can be updated from user context, such as the local_out path. This update can cause bottom halves (bh) to occur, leading to potential concurrency issues. The vulnerability is exemplified by a kernel BUG triggered when smp_processor_id() is called in preemptible code, as observed in the nft_ng_random_eval function within the nft_numgen module. The root cause is the unsafe use of prandom in contexts where preemption is enabled, which can lead to race conditions or inconsistent state. The fix involves replacing prandom with get_random_u32, which uses the kernel's random driver and avoids the need for local per-CPU prandom state. This change not only eliminates the concurrency risk but also aligns with prior improvements where prandom was updated to use the real random driver for non-deterministic randomness. The vulnerability does not have reported exploits in the wild and was published in early 2025. It affects Linux kernel versions identified by specific commit hashes, indicating a code-level flaw rather than a configuration or user-space issue. The vulnerability is technical and subtle, involving kernel preemption and random number generation synchronization, which are critical for kernel stability and security.
Potential Impact
For European organizations, the impact of CVE-2022-49698 primarily concerns the stability and security of Linux-based systems, especially those utilizing netfilter for packet filtering and firewall functionalities. Since Linux is widely deployed in servers, cloud infrastructure, networking equipment, and embedded devices across Europe, this vulnerability could lead to kernel crashes (denial of service) or unpredictable behavior in network packet processing. While there is no direct evidence of privilege escalation or remote code execution, kernel bugs can be leveraged in complex attack chains or cause service disruptions. Organizations relying on Linux for critical infrastructure, including telecommunications, finance, and government services, may experience operational impacts if vulnerable kernels are exploited or encounter instability. The lack of known exploits reduces immediate risk, but the vulnerability's nature suggests that attackers with kernel-level access or local user privileges could trigger system crashes or instability, potentially impacting availability and reliability of services.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch replacing prandom with get_random_u32 in the netfilter subsystem. Since the vulnerability involves kernel code, applying official kernel updates from trusted Linux distributions is the most effective mitigation. For environments where immediate patching is challenging, organizations should audit and restrict local user access to systems running vulnerable kernels to reduce the risk of exploitation. Monitoring kernel logs for BUG messages related to smp_processor_id() or nft_ng_random_eval can help detect attempts to trigger the issue. Additionally, organizations should review their use of nftables and netfilter configurations to ensure they follow best practices and minimize exposure. For embedded or specialized devices, coordination with vendors to obtain patched firmware or kernel versions is critical. Finally, integrating this vulnerability into vulnerability management and patching workflows will ensure timely remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.443Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4893
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:24:43 AM
Last updated: 8/16/2025, 4:56:03 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.