CVE-2022-49691

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
24/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> erspan: do not assume transport header is always set<br /> <br /> Rewrite tests in ip6erspan_tunnel_xmit() and<br /> erspan_fb_xmit() to not assume transport header is set.<br /> <br /> syzbot reported:<br /> <br /> WARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 skb_transport_header include/linux/skbuff.h:2911 [inline]<br /> WARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963<br /> Modules linked in:<br /> CPU: 0 PID: 1350 Comm: aoe_tx0 Not tainted 5.19.0-rc2-syzkaller-00160-g274295c6e53f #0<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014<br /> RIP: 0010:skb_transport_header include/linux/skbuff.h:2911 [inline]<br /> RIP: 0010:ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963<br /> Code: 0f 47 f0 40 88 b5 7f fe ff ff e8 8c 16 4b f9 89 de bf ff ff ff ff e8 a0 12 4b f9 66 83 fb ff 0f 85 1d f1 ff ff e8 71 16 4b f9 0b e9 43 f0 ff ff e8 65 16 4b f9 48 8d 85 30 ff ff ff ba 60 00<br /> RSP: 0018:ffffc90005daf910 EFLAGS: 00010293<br /> RAX: 0000000000000000 RBX: 000000000000ffff RCX: 0000000000000000<br /> RDX: ffff88801f032100 RSI: ffffffff882e8d3f RDI: 0000000000000003<br /> RBP: ffffc90005dafab8 R08: 0000000000000003 R09: 000000000000ffff<br /> R10: 000000000000ffff R11: 0000000000000000 R12: ffff888024f21d40<br /> R13: 000000000000a288 R14: 00000000000000b0 R15: ffff888025a2e000<br /> FS: 0000000000000000(0000) GS:ffff88802c800000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000001b2e425000 CR3: 000000006d099000 CR4: 0000000000152ef0<br /> Call Trace:<br /> <br /> __netdev_start_xmit include/linux/netdevice.h:4805 [inline]<br /> netdev_start_xmit include/linux/netdevice.h:4819 [inline]<br /> xmit_one net/core/dev.c:3588 [inline]<br /> dev_hard_start_xmit+0x188/0x880 net/core/dev.c:3604<br /> sch_direct_xmit+0x19f/0xbe0 net/sched/sch_generic.c:342<br /> __dev_xmit_skb net/core/dev.c:3815 [inline]<br /> __dev_queue_xmit+0x14a1/0x3900 net/core/dev.c:4219<br /> dev_queue_xmit include/linux/netdevice.h:2994 [inline]<br /> tx+0x6a/0xc0 drivers/block/aoe/aoenet.c:63<br /> kthread+0x1e7/0x3b0 drivers/block/aoe/aoecmd.c:1229<br /> kthread+0x2e9/0x3a0 kernel/kthread.c:376<br /> ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.18 (including) 4.19.250 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.202 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.127 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.51 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.8 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*