๐Ÿ” CVE Alert

CVE-2022-49197

UNKNOWN 0.0

af_netlink: Fix shift out of bounds in group mask calculation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: af_netlink: Fix shift out of bounds in group mask calculation When a netlink message is received, netlink_recvmsg() fills in the address of the sender. One of the fields is the 32-bit bitfield nl_groups, which carries the multicast group on which the message was received. The least significant bit corresponds to group 1, and therefore the highest group that the field can represent is 32. Above that, the UB sanitizer flags the out-of-bounds shift attempts. Which bits end up being set in such case is implementation defined, but it's either going to be a wrong non-zero value, or zero, which is at least not misleading. Make the latter choice deterministic by always setting to 0 for higher-numbered multicast groups. To get information about membership in groups >= 32, userspace is expected to use nl_pktinfo control messages[0], which are enabled by NETLINK_PKTINFO socket option. [0] https://lwn.net/Articles/147608/ The way to trigger this issue is e.g. through monitoring the BRVLAN group: # bridge monitor vlan & # ip link add name br type bridge Which produces the following citation: UBSAN: shift-out-of-bounds in net/netlink/af_netlink.c:162:19 shift exponent 32 is too large for 32-bit type 'int'

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < e1c5d46f05aa23d740daae5cd3a6472145afac42 f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < ac5883a8890a11c00b32a19949a25d4afeaa2f5a f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < f75f4abeec4c04b600a15b50c89a481f1e7435ee f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < 41249fff507387c3323b198d0052faed08b14de4 f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < b0898362188e05b2202656058cc32d98fabf3bac f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < 7409ff6393a67ff9838d0ae1bd102fb5f020d07a f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < e8aaf3134bc5e943048eefe9f2ddaabf41d92b1a f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < e23e1e981247feb3c7d0236fe58aceb685f234ae f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198 < 0caf6d9922192dd1afa8dc2131abfb4df1443b9f
Linux / Linux
2.6.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e1c5d46f05aa23d740daae5cd3a6472145afac42 git.kernel.org: https://git.kernel.org/stable/c/ac5883a8890a11c00b32a19949a25d4afeaa2f5a git.kernel.org: https://git.kernel.org/stable/c/f75f4abeec4c04b600a15b50c89a481f1e7435ee git.kernel.org: https://git.kernel.org/stable/c/41249fff507387c3323b198d0052faed08b14de4 git.kernel.org: https://git.kernel.org/stable/c/b0898362188e05b2202656058cc32d98fabf3bac git.kernel.org: https://git.kernel.org/stable/c/7409ff6393a67ff9838d0ae1bd102fb5f020d07a git.kernel.org: https://git.kernel.org/stable/c/e8aaf3134bc5e943048eefe9f2ddaabf41d92b1a git.kernel.org: https://git.kernel.org/stable/c/e23e1e981247feb3c7d0236fe58aceb685f234ae git.kernel.org: https://git.kernel.org/stable/c/0caf6d9922192dd1afa8dc2131abfb4df1443b9f