{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-48687","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-03T14:55:07.144Z","datePublished":"2024-05-03T14:59:32.099Z","dateUpdated":"2025-05-04T08:21:05.103Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:21:05.103Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix out-of-bounds read when setting HMAC data.\n\nThe SRv6 layer allows defining HMAC data that can later be used to sign IPv6\nSegment Routing Headers. This configuration is realised via netlink through\nfour attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and\nSEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual\nlength of the SECRET attribute, it is possible to provide invalid combinations\n(e.g., secret = \"\", secretlen = 64). This case is not checked in the code and\nwith an appropriately crafted netlink message, an out-of-bounds read of up\nto 64 bytes (max secret length) can occur past the skb end pointer and into\nskb_shared_info:\n\nBreakpoint 1, seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208\n208\t\tmemcpy(hinfo->secret, secret, slen);\n(gdb) bt\n #0  seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208\n #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,\n    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 <init_net>, family=<optimized out>,\n    family=<optimized out>) at net/netlink/genetlink.c:731\n #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,\n    family=0xffffffff82fef6c0 <seg6_genl_family>) at net/netlink/genetlink.c:775\n #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792\n #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 <genl_rcv_msg>)\n    at net/netlink/af_netlink.c:2501\n #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803\n #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)\n    at net/netlink/af_netlink.c:1319\n #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=<optimized out>)\n    at net/netlink/af_netlink.c:1345\n #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=<optimized out>, msg=0xffffc90000ba7e48, len=<optimized out>) at net/netlink/af_netlink.c:1921\n...\n(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)->head + ((struct sk_buff *)0xffff88800b1f9f00)->end\n$1 = 0xffff88800b1b76c0\n(gdb) p/x secret\n$2 = 0xffff88800b1b76c0\n(gdb) p slen\n$3 = 64 '@'\n\nThe OOB data can then be read back from userspace by dumping HMAC state. This\ncommit fixes this by ensuring SECRETLEN cannot exceed the actual length of\nSECRET."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/seg6.c"],"versions":[{"version":"4f4853dc1c9c1994f6f756eabdcc25374ff271d9","lessThan":"dc9dbd65c803af1607484fed5da50d41dc8dd864","status":"affected","versionType":"git"},{"version":"4f4853dc1c9c1994f6f756eabdcc25374ff271d9","lessThan":"f684c16971ed5e77dfa25a9ad25b5297e1f58eab","status":"affected","versionType":"git"},{"version":"4f4853dc1c9c1994f6f756eabdcc25374ff271d9","lessThan":"3df71e11a4773d775c3633c44319f7acdb89011c","status":"affected","versionType":"git"},{"version":"4f4853dc1c9c1994f6f756eabdcc25374ff271d9","lessThan":"076f2479fc5a15c4a970ca3b5e57d42ba09a31fa","status":"affected","versionType":"git"},{"version":"4f4853dc1c9c1994f6f756eabdcc25374ff271d9","lessThan":"55195563ec29f80f984237b743de0e2b6ba4d093","status":"affected","versionType":"git"},{"version":"4f4853dc1c9c1994f6f756eabdcc25374ff271d9","lessThan":"56ad3f475482bca55b0ae544031333018eb145b3","status":"affected","versionType":"git"},{"version":"4f4853dc1c9c1994f6f756eabdcc25374ff271d9","lessThan":"84a53580c5d2138c7361c7c3eea5b31827e63b35","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/seg6.c"],"versions":[{"version":"4.10","status":"affected"},{"version":"0","lessThan":"4.10","status":"unaffected","versionType":"semver"},{"version":"4.14.293","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.258","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.213","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.143","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.68","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.19.9","lessThanOrEqual":"5.19.*","status":"unaffected","versionType":"semver"},{"version":"6.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"4.14.293"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"4.19.258"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.4.213"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.10.143"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.15.68"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.19.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/dc9dbd65c803af1607484fed5da50d41dc8dd864"},{"url":"https://git.kernel.org/stable/c/f684c16971ed5e77dfa25a9ad25b5297e1f58eab"},{"url":"https://git.kernel.org/stable/c/3df71e11a4773d775c3633c44319f7acdb89011c"},{"url":"https://git.kernel.org/stable/c/076f2479fc5a15c4a970ca3b5e57d42ba09a31fa"},{"url":"https://git.kernel.org/stable/c/55195563ec29f80f984237b743de0e2b6ba4d093"},{"url":"https://git.kernel.org/stable/c/56ad3f475482bca55b0ae544031333018eb145b3"},{"url":"https://git.kernel.org/stable/c/84a53580c5d2138c7361c7c3eea5b31827e63b35"}],"title":"ipv6: sr: fix out-of-bounds read when setting HMAC data.","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-12T20:39:43.146783Z","id":"CVE-2022-48687","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-30T15:44:49.267Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T15:17:55.722Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/dc9dbd65c803af1607484fed5da50d41dc8dd864","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f684c16971ed5e77dfa25a9ad25b5297e1f58eab","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/3df71e11a4773d775c3633c44319f7acdb89011c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/076f2479fc5a15c4a970ca3b5e57d42ba09a31fa","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/55195563ec29f80f984237b743de0e2b6ba4d093","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/56ad3f475482bca55b0ae544031333018eb145b3","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/84a53580c5d2138c7361c7c3eea5b31827e63b35","tags":["x_transferred"]}]}]}}