In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix panic when forwarding a pkt with no in6 dev
kongweibin reported a kernel panic in ip6_forward() when input interface has no in6 dev associated.
The following tc commands were used to reproduce this panic: tc qdisc del dev vxlan100 root tc qdisc add dev vxlan100 root netem corrupt 5%
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49048.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49048.json"
[
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435",
"deprecated": false,
"digest": {
"function_hash": "22537512952702394901431037535533507387",
"length": 2853.0
},
"id": "CVE-2022-49048-0fcba38e",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e69fb3de87a8923e5931a272a38fa3cceb01da44",
"deprecated": false,
"digest": {
"function_hash": "38274189472619014692878342542905296165",
"length": 2896.0
},
"id": "CVE-2022-49048-1b85f31e",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74b68f5249f16c5f7f675d0f604fa6ae20e3a151",
"deprecated": false,
"digest": {
"function_hash": "22537512952702394901431037535533507387",
"length": 2853.0
},
"id": "CVE-2022-49048-2510f688",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a263712ba8c9ded25dd9d2d5ced11bcea5b33a3e",
"deprecated": false,
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-31fd6414",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74b68f5249f16c5f7f675d0f604fa6ae20e3a151",
"deprecated": false,
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-37692b75",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adee01bbf6cb5b3e4ed08be8ff866aac90f13836",
"deprecated": false,
"digest": {
"function_hash": "38274189472619014692878342542905296165",
"length": 2896.0
},
"id": "CVE-2022-49048-6f67a014",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adee01bbf6cb5b3e4ed08be8ff866aac90f13836",
"deprecated": false,
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-74ee79fd",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e69fb3de87a8923e5931a272a38fa3cceb01da44",
"deprecated": false,
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-8d7c22b7",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3fa461d8b0e185b7da8a101fe94dfe6dd500ac0",
"deprecated": false,
"digest": {
"function_hash": "38274189472619014692878342542905296165",
"length": 2896.0
},
"id": "CVE-2022-49048-9829e5f0",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3fa461d8b0e185b7da8a101fe94dfe6dd500ac0",
"deprecated": false,
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-a78927d5",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435",
"deprecated": false,
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-d1dcd78b",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a263712ba8c9ded25dd9d2d5ced11bcea5b33a3e",
"deprecated": false,
"digest": {
"function_hash": "301014032784868179434105393367635880886",
"length": 2863.0
},
"id": "CVE-2022-49048-d52b5f37",
"signature_type": "Function"
}
]