๐Ÿ” CVE Alert

CVE-2022-49728

UNKNOWN 0.0

ipv6: Fix signed integer overflow in __ip6_append_data

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix signed integer overflow in __ip6_append_data Resurrect ubsan overflow checks and ubsan report this warning, fix it by change the variable [length] type to size_t. UBSAN: signed-integer-overflow in net/ipv6/ip6_output.c:1489:19 2147479552 + 8567 cannot be represented in type 'int' CPU: 0 PID: 253 Comm: err Not tainted 5.16.0+ #1 Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace+0x214/0x230 show_stack+0x30/0x78 dump_stack_lvl+0xf8/0x118 dump_stack+0x18/0x30 ubsan_epilogue+0x18/0x60 handle_overflow+0xd0/0xf0 __ubsan_handle_add_overflow+0x34/0x44 __ip6_append_data.isra.48+0x1598/0x1688 ip6_append_data+0x128/0x260 udpv6_sendmsg+0x680/0xdd0 inet6_sendmsg+0x54/0x90 sock_sendmsg+0x70/0x88 ____sys_sendmsg+0xe8/0x368 ___sys_sendmsg+0x98/0xe0 __sys_sendmmsg+0xf4/0x3b8 __arm64_sys_sendmmsg+0x34/0x48 invoke_syscall+0x64/0x160 el0_svc_common.constprop.4+0x124/0x300 do_el0_svc+0x44/0xc8 el0_svc+0x3c/0x1e8 el0t_64_sync_handler+0x88/0xb0 el0t_64_sync+0x16c/0x170 Changes since v1: -Change the variable [length] type to unsigned, as Eric Dumazet suggested. Changes since v2: -Don't change exthdrlen type in ip6_make_skb, as Paolo Abeni suggested. Changes since v3: -Don't change ulen type in udpv6_sendmsg and l2tp_ip6_sendmsg, as Jakub Kicinski suggested.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f26422eabeb517629568edf8c2dd9c6cb9147584 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 70549c80fe80ac4e2a22068c76ebebced24f7e74 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 84dc940890e91e42898e4443a093281702440abf 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f93431c86b631bbca5614c66f966bf3ddb3c2803
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f26422eabeb517629568edf8c2dd9c6cb9147584 git.kernel.org: https://git.kernel.org/stable/c/70549c80fe80ac4e2a22068c76ebebced24f7e74 git.kernel.org: https://git.kernel.org/stable/c/84dc940890e91e42898e4443a093281702440abf git.kernel.org: https://git.kernel.org/stable/c/f93431c86b631bbca5614c66f966bf3ddb3c2803 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html