CVE-2022-49728

Severity CVSS v4.0:
Pending analysis
Type:
CWE-190 Integer Overflow or Wraparound
Publication date:
26/02/2025
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipv6: Fix signed integer overflow in __ip6_append_data<br /> <br /> Resurrect ubsan overflow checks and ubsan report this warning,<br /> fix it by change the variable [length] type to size_t.<br /> <br /> UBSAN: signed-integer-overflow in net/ipv6/ip6_output.c:1489:19<br /> 2147479552 + 8567 cannot be represented in type &amp;#39;int&amp;#39;<br /> CPU: 0 PID: 253 Comm: err Not tainted 5.16.0+ #1<br /> Hardware name: linux,dummy-virt (DT)<br /> Call trace:<br /> dump_backtrace+0x214/0x230<br /> show_stack+0x30/0x78<br /> dump_stack_lvl+0xf8/0x118<br /> dump_stack+0x18/0x30<br /> ubsan_epilogue+0x18/0x60<br /> handle_overflow+0xd0/0xf0<br /> __ubsan_handle_add_overflow+0x34/0x44<br /> __ip6_append_data.isra.48+0x1598/0x1688<br /> ip6_append_data+0x128/0x260<br /> udpv6_sendmsg+0x680/0xdd0<br /> inet6_sendmsg+0x54/0x90<br /> sock_sendmsg+0x70/0x88<br /> ____sys_sendmsg+0xe8/0x368<br /> ___sys_sendmsg+0x98/0xe0<br /> __sys_sendmmsg+0xf4/0x3b8<br /> __arm64_sys_sendmmsg+0x34/0x48<br /> invoke_syscall+0x64/0x160<br /> el0_svc_common.constprop.4+0x124/0x300<br /> do_el0_svc+0x44/0xc8<br /> el0_svc+0x3c/0x1e8<br /> el0t_64_sync_handler+0x88/0xb0<br /> el0t_64_sync+0x16c/0x170<br /> <br /> Changes since v1:<br /> -Change the variable [length] type to unsigned, as Eric Dumazet suggested.<br /> Changes since v2:<br /> -Don&amp;#39;t change exthdrlen type in ip6_make_skb, as Paolo Abeni suggested.<br /> Changes since v3:<br /> -Don&amp;#39;t change ulen type in udpv6_sendmsg and l2tp_ip6_sendmsg, as<br /> Jakub Kicinski suggested.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18.6 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*