CVE-2022-49728
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
26/02/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipv6: Fix signed integer overflow in __ip6_append_data<br />
<br />
Resurrect ubsan overflow checks and ubsan report this warning,<br />
fix it by change the variable [length] type to size_t.<br />
<br />
UBSAN: signed-integer-overflow in net/ipv6/ip6_output.c:1489:19<br />
2147479552 + 8567 cannot be represented in type &#39;int&#39;<br />
CPU: 0 PID: 253 Comm: err Not tainted 5.16.0+ #1<br />
Hardware name: linux,dummy-virt (DT)<br />
Call trace:<br />
dump_backtrace+0x214/0x230<br />
show_stack+0x30/0x78<br />
dump_stack_lvl+0xf8/0x118<br />
dump_stack+0x18/0x30<br />
ubsan_epilogue+0x18/0x60<br />
handle_overflow+0xd0/0xf0<br />
__ubsan_handle_add_overflow+0x34/0x44<br />
__ip6_append_data.isra.48+0x1598/0x1688<br />
ip6_append_data+0x128/0x260<br />
udpv6_sendmsg+0x680/0xdd0<br />
inet6_sendmsg+0x54/0x90<br />
sock_sendmsg+0x70/0x88<br />
____sys_sendmsg+0xe8/0x368<br />
___sys_sendmsg+0x98/0xe0<br />
__sys_sendmmsg+0xf4/0x3b8<br />
__arm64_sys_sendmmsg+0x34/0x48<br />
invoke_syscall+0x64/0x160<br />
el0_svc_common.constprop.4+0x124/0x300<br />
do_el0_svc+0x44/0xc8<br />
el0_svc+0x3c/0x1e8<br />
el0t_64_sync_handler+0x88/0xb0<br />
el0t_64_sync+0x16c/0x170<br />
<br />
Changes since v1:<br />
-Change the variable [length] type to unsigned, as Eric Dumazet suggested.<br />
Changes since v2:<br />
-Don&#39;t change exthdrlen type in ip6_make_skb, as Paolo Abeni suggested.<br />
Changes since v3:<br />
-Don&#39;t change ulen type in udpv6_sendmsg and l2tp_ip6_sendmsg, as<br />
Jakub Kicinski suggested.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18.6 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/70549c80fe80ac4e2a22068c76ebebced24f7e74
- https://git.kernel.org/stable/c/84dc940890e91e42898e4443a093281702440abf
- https://git.kernel.org/stable/c/f26422eabeb517629568edf8c2dd9c6cb9147584
- https://git.kernel.org/stable/c/f93431c86b631bbca5614c66f966bf3ddb3c2803
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



