{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-48651","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-25T13:44:28.317Z","datePublished":"2024-04-28T13:00:42.929Z","dateUpdated":"2025-05-04T08:20:35.610Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:20:35.610Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Fix out-of-bound bugs caused by unset skb->mac_header\n\nIf an AF_PACKET socket is used to send packets through ipvlan and the\ndefault xmit function of the AF_PACKET socket is changed from\ndev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option\nname of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and\nremains as the initial value of 65535, this may trigger slab-out-of-bounds\nbugs as following:\n\n=================================================================\nUG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nPU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6\nardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33\nall Trace:\nprint_address_description.constprop.0+0x1d/0x160\nprint_report.cold+0x4f/0x112\nkasan_report+0xa3/0x130\nipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nipvlan_start_xmit+0x29/0xa0 [ipvlan]\n__dev_direct_xmit+0x2e2/0x380\npacket_direct_xmit+0x22/0x60\npacket_snd+0x7c9/0xc40\nsock_sendmsg+0x9a/0xa0\n__sys_sendto+0x18a/0x230\n__x64_sys_sendto+0x74/0x90\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe root cause is:\n  1. packet_snd() only reset skb->mac_header when sock->type is SOCK_RAW\n     and skb->protocol is not specified as in packet_parse_headers()\n\n  2. packet_direct_xmit() doesn't reset skb->mac_header as dev_queue_xmit()\n\nIn this case, skb->mac_header is 65535 when ipvlan_xmit_mode_l2() is\ncalled. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which\nuse \"skb->head + skb->mac_header\", out-of-bound access occurs.\n\nThis patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()\nand reset mac header in multicast to solve this out-of-bound bug."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ipvlan/ipvlan_core.c"],"versions":[{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"e2b46cd5796f083e452fbc624f65b80328b0c1a4","status":"affected","versionType":"git"},{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"25efdbe5fe542c3063d1948cc4e98abcb57621ca","status":"affected","versionType":"git"},{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"bffcdade259c05ab3436b5fab711612093c275ef","status":"affected","versionType":"git"},{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"346e94aa4a99378592c46d6a34c72703a32bd5be","status":"affected","versionType":"git"},{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"ab4a733874ead120691e8038272d22f8444d3638","status":"affected","versionType":"git"},{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"8d06006c7eb75587d986da46c48ba9274f94e8e7","status":"affected","versionType":"git"},{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"b583e6b25bf9321c91154f6c78d2173ef12c4241","status":"affected","versionType":"git"},{"version":"2ad7bf3638411cb547f2823df08166c13ab04269","lessThan":"81225b2ea161af48e093f58e8dfee6d705b16af4","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ipvlan/ipvlan_core.c"],"versions":[{"version":"3.19","status":"affected"},{"version":"0","lessThan":"3.19","status":"unaffected","versionType":"semver"},{"version":"4.9.330","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.295","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.260","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.215","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.146","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.71","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.19.12","lessThanOrEqual":"5.19.*","status":"unaffected","versionType":"semver"},{"version":"6.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"4.9.330"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"4.14.295"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"4.19.260"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.4.215"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.10.146"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.15.71"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.19.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"6.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e2b46cd5796f083e452fbc624f65b80328b0c1a4"},{"url":"https://git.kernel.org/stable/c/25efdbe5fe542c3063d1948cc4e98abcb57621ca"},{"url":"https://git.kernel.org/stable/c/bffcdade259c05ab3436b5fab711612093c275ef"},{"url":"https://git.kernel.org/stable/c/346e94aa4a99378592c46d6a34c72703a32bd5be"},{"url":"https://git.kernel.org/stable/c/ab4a733874ead120691e8038272d22f8444d3638"},{"url":"https://git.kernel.org/stable/c/8d06006c7eb75587d986da46c48ba9274f94e8e7"},{"url":"https://git.kernel.org/stable/c/b583e6b25bf9321c91154f6c78d2173ef12c4241"},{"url":"https://git.kernel.org/stable/c/81225b2ea161af48e093f58e8dfee6d705b16af4"}],"title":"ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.7,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"id":"CVE-2022-48651","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-04-30T15:57:11.904317Z"}}}],"affected":[{"cpes":["cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*"],"vendor":"linux","product":"linux_kernel","versions":[{"status":"affected","version":"3.19"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*"],"vendor":"linux","product":"linux_kernel","versions":[{"status":"affected","version":"2ad7bf363841"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-125","description":"CWE-125 Out-of-bounds Read"}]}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:16:46.123Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T15:17:55.603Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/e2b46cd5796f083e452fbc624f65b80328b0c1a4","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/25efdbe5fe542c3063d1948cc4e98abcb57621ca","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/bffcdade259c05ab3436b5fab711612093c275ef","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/346e94aa4a99378592c46d6a34c72703a32bd5be","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ab4a733874ead120691e8038272d22f8444d3638","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8d06006c7eb75587d986da46c48ba9274f94e8e7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b583e6b25bf9321c91154f6c78d2173ef12c4241","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/81225b2ea161af48e093f58e8dfee6d705b16af4","tags":["x_transferred"]}]}]}}