Signed Integer Overflow in Linux Kernel's IPv6 L2TP Protocol
CVE-2022-49727

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
26 February 2025

Summary

The Linux kernel's implementation of the L2TP/IPV6 protocol is affected by a signed integer overflow vulnerability. This occurs when the length parameter is close to its maximum value combined with the size of the transmission header, which could lead to unexpected behavior. The fix involves adjusting the calculations similar to the UDPv6 protocol, thereby preventing potential overflows. Users are advised to upgrade to the latest version of the Linux kernel to mitigate the risk.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2cf73c7cb6125083408d77f43d0e84d86aed0000

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 0e818d433fc2718fe4da044ffca7431812a7e04e

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6c4e3486d21173d60925ef52e512cae727b43d30

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.