Signed Integer Overflow in Linux Kernel's IPv6 L2TP Protocol
CVE-2022-49727

5.5MEDIUM

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
26 February 2025

What is CVE-2022-49727?

The Linux kernel's implementation of the L2TP/IPV6 protocol is affected by a signed integer overflow vulnerability. This occurs when the length parameter is close to its maximum value combined with the size of the transmission header, which could lead to unexpected behavior. The fix involves adjusting the calculations similar to the UDPv6 protocol, thereby preventing potential overflows. Users are advised to upgrade to the latest version of the Linux kernel to mitigate the risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Linux a32e0eec7042b21ccb52896cf715e3e2641fed93 < 2cf73c7cb6125083408d77f43d0e84d86aed0000

Linux a32e0eec7042b21ccb52896cf715e3e2641fed93 < 0e818d433fc2718fe4da044ffca7431812a7e04e

Linux a32e0eec7042b21ccb52896cf715e3e2641fed93 < 6c4e3486d21173d60925ef52e512cae727b43d30

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.