CVE-2022-49340
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
21/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ip_gre: test csum_start instead of transport header<br />
<br />
GRE with TUNNEL_CSUM will apply local checksum offload on<br />
CHECKSUM_PARTIAL packets.<br />
<br />
ipgre_xmit must validate csum_start after an optional skb_pull,<br />
else lco_csum may trigger an overflow. The original check was<br />
<br />
if (csum && skb_checksum_start(skb) data)<br />
return -EINVAL;<br />
<br />
This had false positives when skb_checksum_start is undefined:<br />
when ip_summed is not CHECKSUM_PARTIAL. A discussed refinement<br />
was straightforward<br />
<br />
if (csum && skb->ip_summed == CHECKSUM_PARTIAL &&<br />
skb_checksum_start(skb) data)<br />
return -EINVAL;<br />
<br />
But was eventually revised more thoroughly:<br />
- restrict the check to the only branch where needed, in an<br />
uncommon GRE path that uses header_ops and calls skb_pull.<br />
- test skb_transport_header, which is set along with csum_start<br />
in skb_partial_csum_set in the normal header_ops datapath.<br />
<br />
Turns out skbs can arrive in this branch without the transport<br />
header set, e.g., through BPF redirection.<br />
<br />
Revise the check back to check csum_start directly, and only if<br />
CHECKSUM_PARTIAL. Do leave the check in the updated location.<br />
Check field regardless of whether TUNNEL_CSUM is configured.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.207 (including) | 4.19.247 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.148 (including) | 5.4.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.68 (including) | 5.10.122 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14.7 (including) | 5.15.47 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.17.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 5.18.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c92d813c7c9ca2212ecd879232e7d87362fce98
- https://git.kernel.org/stable/c/0ffa268724656633af5f37a38c212326d98ebe8c
- https://git.kernel.org/stable/c/3d08bc3a5d9b2106f5c8bcf1adb73147824aa006
- https://git.kernel.org/stable/c/7596bd7920985f7fc8579a92e48bc53ce4475b21
- https://git.kernel.org/stable/c/8d21e9963bec1aad2280cdd034c8993033ef2948
- https://git.kernel.org/stable/c/e6b6f98fc7605c06c0a3baa70f62c534d7b4ce58
- https://git.kernel.org/stable/c/fbeb8dfa8b87ef259eef0c89e39b53962a3cf604



