{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-49870","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-05-01T14:05:17.237Z","datePublished":"2025-05-01T14:10:21.134Z","dateUpdated":"2026-05-11T19:08:20.102Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:08:20.102Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncapabilities: fix undefined behavior in bit shift for CAP_TO_MASK\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in security/commoncap.c:1252:2\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n cap_task_prctl+0x561/0x6f0\n security_task_prctl+0x5a/0xb0\n __x64_sys_prctl+0x61/0x8f0\n do_syscall_64+0x58/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n </TASK>"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/uapi/linux/capability.h"],"versions":[{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"5b79fa628e2ab789e629a83cd211ef9b4c1a593e","status":"affected","versionType":"git"},{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"65b0bc7a0690861812ade523d19f82688ab819dc","status":"affected","versionType":"git"},{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"dbaab08c8677d598244d21afb7818e44e1c5d826","status":"affected","versionType":"git"},{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"5661f111a1616ac105ec8cec81bff99b60f847ac","status":"affected","versionType":"git"},{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"fcbd2b336834bd24e1d9454ad5737856470c10d7","status":"affected","versionType":"git"},{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"151dc8087b5609e53b069c068e3f3ee100efa586","status":"affected","versionType":"git"},{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"27bdb134c043ff32c459d98f16550d0ffa0b3c34","status":"affected","versionType":"git"},{"version":"e338d263a76af78fe8f38a72131188b58fceb591","lessThan":"46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/uapi/linux/capability.h"],"versions":[{"version":"2.6.25","status":"affected"},{"version":"0","lessThan":"2.6.25","status":"unaffected","versionType":"semver"},{"version":"4.9.334","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.300","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.267","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.225","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.155","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.79","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.9","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"4.9.334"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"4.14.300"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"4.19.267"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"5.4.225"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"5.10.155"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"5.15.79"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"6.0.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/5b79fa628e2ab789e629a83cd211ef9b4c1a593e"},{"url":"https://git.kernel.org/stable/c/65b0bc7a0690861812ade523d19f82688ab819dc"},{"url":"https://git.kernel.org/stable/c/dbaab08c8677d598244d21afb7818e44e1c5d826"},{"url":"https://git.kernel.org/stable/c/5661f111a1616ac105ec8cec81bff99b60f847ac"},{"url":"https://git.kernel.org/stable/c/fcbd2b336834bd24e1d9454ad5737856470c10d7"},{"url":"https://git.kernel.org/stable/c/151dc8087b5609e53b069c068e3f3ee100efa586"},{"url":"https://git.kernel.org/stable/c/27bdb134c043ff32c459d98f16550d0ffa0b3c34"},{"url":"https://git.kernel.org/stable/c/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13"}],"title":"capabilities: fix undefined behavior in bit shift for CAP_TO_MASK","x_generator":{"engine":"bippy-1.2.0"}}}}