{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-49048","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-02-26T01:49:39.242Z","datePublished":"2025-02-26T01:54:24.115Z","dateUpdated":"2025-05-04T12:44:13.362Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T12:44:13.362Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix panic when forwarding a pkt with no in6 dev\n\nkongweibin reported a kernel panic in ip6_forward() when input interface\nhas no in6 dev associated.\n\nThe following tc commands were used to reproduce this panic:\ntc qdisc del dev vxlan100 root\ntc qdisc add dev vxlan100 root netem corrupt 5%"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/ip6_output.c"],"versions":[{"version":"bff0854e2f804f68d3e93d19e4580dbd69777e1d","lessThan":"74b68f5249f16c5f7f675d0f604fa6ae20e3a151","status":"affected","versionType":"git"},{"version":"7f4848229e91d508102b30396b8a1b710ac23637","lessThan":"ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435","status":"affected","versionType":"git"},{"version":"79ec7b5b2f4fe38e5c7459ed0bdff4ef3386ab63","lessThan":"a263712ba8c9ded25dd9d2d5ced11bcea5b33a3e","status":"affected","versionType":"git"},{"version":"ccd27f05ae7b8ebc40af5b004e94517a919aa862","lessThan":"adee01bbf6cb5b3e4ed08be8ff866aac90f13836","status":"affected","versionType":"git"},{"version":"ccd27f05ae7b8ebc40af5b004e94517a919aa862","lessThan":"e69fb3de87a8923e5931a272a38fa3cceb01da44","status":"affected","versionType":"git"},{"version":"ccd27f05ae7b8ebc40af5b004e94517a919aa862","lessThan":"e3fa461d8b0e185b7da8a101fe94dfe6dd500ac0","status":"affected","versionType":"git"},{"version":"350e10d217337480158b604bbf6601c50ed161c6","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/ip6_output.c"],"versions":[{"version":"5.14","status":"affected"},{"version":"0","lessThan":"5.14","status":"unaffected","versionType":"semver"},{"version":"4.19.239","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.190","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.112","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.35","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.17.4","lessThanOrEqual":"5.17.*","status":"unaffected","versionType":"semver"},{"version":"5.18","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.199","versionEndExcluding":"4.19.239"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.136","versionEndExcluding":"5.4.190"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.54","versionEndExcluding":"5.10.112"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"5.15.35"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"5.17.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"5.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/74b68f5249f16c5f7f675d0f604fa6ae20e3a151"},{"url":"https://git.kernel.org/stable/c/ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435"},{"url":"https://git.kernel.org/stable/c/a263712ba8c9ded25dd9d2d5ced11bcea5b33a3e"},{"url":"https://git.kernel.org/stable/c/adee01bbf6cb5b3e4ed08be8ff866aac90f13836"},{"url":"https://git.kernel.org/stable/c/e69fb3de87a8923e5931a272a38fa3cceb01da44"},{"url":"https://git.kernel.org/stable/c/e3fa461d8b0e185b7da8a101fe94dfe6dd500ac0"}],"title":"ipv6: fix panic when forwarding a pkt with no in6 dev","x_generator":{"engine":"bippy-1.2.0"}}}}