CVE-2022-49727

In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg

When len >= INT_MAX - transhdrlen, ulen = len + transhdrlen will be
overflow. To fix, we can follow what udpv6 does and subtract the
transhdrlen from the max.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
LinuxCNA
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 15%
VendorProductVersion
linuxlinux_kernel
𝑥
< 4.9.320
linuxlinux_kernel
4.10 ≤
𝑥
< 4.14.285
linuxlinux_kernel
4.15 ≤
𝑥
< 4.19.249
linuxlinux_kernel
4.20 ≤
𝑥
< 5.4.200
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.124
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.49
linuxlinux_kernel
5.16 ≤
𝑥
< 5.18.6
linuxlinux_kernel
5.19:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.234-1
fixed
bookworm
6.1.123-1
fixed
bookworm (security)
6.1.128-1
fixed
trixie
6.12.12-1
fixed
sid
6.12.16-1
fixed