CVE-2022-49727

EUVD-2022-54508
In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg

When len >= INT_MAX - transhdrlen, ulen = len + transhdrlen will be
overflow. To fix, we can follow what udpv6 does and subtract the
transhdrlen from the max.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
𝑥
< 4.9.320
linuxlinux_kernel
4.10 ≤
𝑥
< 4.14.285
linuxlinux_kernel
4.15 ≤
𝑥
< 4.19.249
linuxlinux_kernel
4.20 ≤
𝑥
< 5.4.200
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.124
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.49
linuxlinux_kernel
5.16 ≤
𝑥
< 5.18.6
linuxlinux_kernel
5.19:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.123-1
fixed
bookworm (security)
6.1.128-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.234-1
fixed
sid
6.12.16-1
fixed
trixie
6.12.12-1
fixed