CVE-2022-49776

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
07/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> macvlan: enforce a consistent minimal mtu<br /> <br /> macvlan should enforce a minimal mtu of 68, even at link creation.<br /> <br /> This patch avoids the current behavior (which could lead to crashes<br /> in ipv6 stack if the link is brought up)<br /> <br /> $ ip link add macvlan1 link eno1 mtu 8 type macvlan # This should fail !<br /> $ ip link sh dev macvlan1<br /> 5: macvlan1@eno1: mtu 8 qdisc noop<br /> state DOWN mode DEFAULT group default qlen 1000<br /> link/ether 02:47:6c:24:74:82 brd ff:ff:ff:ff:ff:ff<br /> $ ip link set macvlan1 mtu 67<br /> Error: mtu less than device minimum.<br /> $ ip link set macvlan1 mtu 68<br /> $ ip link set macvlan1 mtu 8<br /> Error: mtu less than device minimum.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.300 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.267 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.225 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.156 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.80 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.0.10 (excluding)