In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix panic when forwarding a pkt with no in6 dev
kongweibin reported a kernel panic in ip6_forward() when input interface has no in6 dev associated.
The following tc commands were used to reproduce this panic: tc qdisc del dev vxlan100 root tc qdisc add dev vxlan100 root netem corrupt 5%
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49048.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49048.json"
[
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435",
"digest": {
"function_hash": "22537512952702394901431037535533507387",
"length": 2853.0
},
"id": "CVE-2022-49048-0fcba38e",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e69fb3de87a8923e5931a272a38fa3cceb01da44",
"digest": {
"function_hash": "38274189472619014692878342542905296165",
"length": 2896.0
},
"id": "CVE-2022-49048-1b85f31e",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74b68f5249f16c5f7f675d0f604fa6ae20e3a151",
"digest": {
"function_hash": "22537512952702394901431037535533507387",
"length": 2853.0
},
"id": "CVE-2022-49048-2510f688",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74b68f5249f16c5f7f675d0f604fa6ae20e3a151",
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-37692b75",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adee01bbf6cb5b3e4ed08be8ff866aac90f13836",
"digest": {
"function_hash": "38274189472619014692878342542905296165",
"length": 2896.0
},
"id": "CVE-2022-49048-6f67a014",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adee01bbf6cb5b3e4ed08be8ff866aac90f13836",
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-74ee79fd",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e69fb3de87a8923e5931a272a38fa3cceb01da44",
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-8d7c22b7",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3fa461d8b0e185b7da8a101fe94dfe6dd500ac0",
"digest": {
"function_hash": "38274189472619014692878342542905296165",
"length": 2896.0
},
"id": "CVE-2022-49048-9829e5f0",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c",
"function": "ip6_forward"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3fa461d8b0e185b7da8a101fe94dfe6dd500ac0",
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-a78927d5",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435",
"digest": {
"line_hashes": [
"282228883033229108019327183038074058740",
"120010657209029581209874932543271481011",
"314553252133435214355016515012432391167",
"284353392737436888302186947728470242624"
],
"threshold": 0.9
},
"id": "CVE-2022-49048-d1dcd78b",
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
}
}
]