CVE-2022-49066

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
14/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> veth: Ensure eth header is in skb&amp;#39;s linear part<br /> <br /> After feeding a decapsulated packet to a veth device with act_mirred,<br /> skb_headlen() may be 0. But veth_xmit() calls __dev_forward_skb(),<br /> which expects at least ETH_HLEN byte of linear data (as<br /> __dev_forward_skb2() calls eth_type_trans(), which pulls ETH_HLEN bytes<br /> unconditionally).<br /> <br /> Use pskb_may_pull() to ensure veth_xmit() respects this constraint.<br /> <br /> kernel BUG at include/linux/skbuff.h:2328!<br /> RIP: 0010:eth_type_trans+0xcf/0x140<br /> Call Trace:<br /> <br /> __dev_forward_skb2+0xe3/0x160<br /> veth_xmit+0x6e/0x250 [veth]<br /> dev_hard_start_xmit+0xc7/0x200<br /> __dev_queue_xmit+0x47f/0x520<br /> ? skb_ensure_writable+0x85/0xa0<br /> ? skb_mpls_pop+0x98/0x1c0<br /> tcf_mirred_act+0x442/0x47e [act_mirred]<br /> tcf_action_exec+0x86/0x140<br /> fl_classify+0x1d8/0x1e0 [cls_flower]<br /> ? dma_pte_clear_level+0x129/0x1a0<br /> ? dma_pte_clear_level+0x129/0x1a0<br /> ? prb_fill_curr_block+0x2f/0xc0<br /> ? skb_copy_bits+0x11a/0x220<br /> __tcf_classify+0x58/0x110<br /> tcf_classify_ingress+0x6b/0x140<br /> __netif_receive_skb_core.constprop.0+0x47d/0xfd0<br /> ? __iommu_dma_unmap_swiotlb+0x44/0x90<br /> __netif_receive_skb_one_core+0x3d/0xa0<br /> netif_receive_skb+0x116/0x170<br /> be_process_rx+0x22f/0x330 [be2net]<br /> be_poll+0x13c/0x370 [be2net]<br /> __napi_poll+0x2a/0x170<br /> net_rx_action+0x22f/0x2f0<br /> __do_softirq+0xca/0x2a8<br /> __irq_exit_rcu+0xc1/0xe0<br /> common_interrupt+0x83/0xa0

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.24 (including) 4.9.311 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.276 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.239 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.190 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.112 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.35 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.17.4 (excluding)
cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*