{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-49776","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T07:17:33.805Z","datePublished":"2025-05-01T14:09:12.572Z","dateUpdated":"2026-05-11T19:06:33.701Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:06:33.701Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: enforce a consistent minimal mtu\n\nmacvlan should enforce a minimal mtu of 68, even at link creation.\n\nThis patch avoids the current behavior (which could lead to crashes\nin ipv6 stack if the link is brought up)\n\n$ ip link add macvlan1 link eno1 mtu 8 type macvlan  # This should fail !\n$ ip link sh dev macvlan1\n5: macvlan1@eno1: <BROADCAST,MULTICAST> mtu 8 qdisc noop\n    state DOWN mode DEFAULT group default qlen 1000\n    link/ether 02:47:6c:24:74:82 brd ff:ff:ff:ff:ff:ff\n$ ip link set macvlan1 mtu 67\nError: mtu less than device minimum.\n$ ip link set macvlan1 mtu 68\n$ ip link set macvlan1 mtu 8\nError: mtu less than device minimum."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/macvlan.c"],"versions":[{"version":"91572088e3fdbf4fe31cf397926d8b890fdb3237","lessThan":"d2fee7d121d189c6dc905b727d60e7043a6655bb","status":"affected","versionType":"git"},{"version":"91572088e3fdbf4fe31cf397926d8b890fdb3237","lessThan":"650137a7c0b2892df2e5b0bc112d7b09a78c93c8","status":"affected","versionType":"git"},{"version":"91572088e3fdbf4fe31cf397926d8b890fdb3237","lessThan":"a62aa84fe19eb24d083d600a074c009a0a66d4f3","status":"affected","versionType":"git"},{"version":"91572088e3fdbf4fe31cf397926d8b890fdb3237","lessThan":"e929ec98c0c3b10d9c07f3776df0c1a02d7a763e","status":"affected","versionType":"git"},{"version":"91572088e3fdbf4fe31cf397926d8b890fdb3237","lessThan":"e41cbf98df22d08402e65174d147cbb187fe1a33","status":"affected","versionType":"git"},{"version":"91572088e3fdbf4fe31cf397926d8b890fdb3237","lessThan":"2b055c719d8f94c15ec9b7659978133030c6a353","status":"affected","versionType":"git"},{"version":"91572088e3fdbf4fe31cf397926d8b890fdb3237","lessThan":"b64085b00044bdf3cd1c9825e9ef5b2e0feae91a","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/macvlan.c"],"versions":[{"version":"4.10","status":"affected"},{"version":"0","lessThan":"4.10","status":"unaffected","versionType":"semver"},{"version":"4.14.300","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.267","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.225","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.156","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.80","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.10","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"4.14.300"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"4.19.267"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.4.225"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.10.156"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"5.15.80"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.0.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d2fee7d121d189c6dc905b727d60e7043a6655bb"},{"url":"https://git.kernel.org/stable/c/650137a7c0b2892df2e5b0bc112d7b09a78c93c8"},{"url":"https://git.kernel.org/stable/c/a62aa84fe19eb24d083d600a074c009a0a66d4f3"},{"url":"https://git.kernel.org/stable/c/e929ec98c0c3b10d9c07f3776df0c1a02d7a763e"},{"url":"https://git.kernel.org/stable/c/e41cbf98df22d08402e65174d147cbb187fe1a33"},{"url":"https://git.kernel.org/stable/c/2b055c719d8f94c15ec9b7659978133030c6a353"},{"url":"https://git.kernel.org/stable/c/b64085b00044bdf3cd1c9825e9ef5b2e0feae91a"}],"title":"macvlan: enforce a consistent minimal mtu","x_generator":{"engine":"bippy-1.2.0"}}}}