5.5
CVE-2022-49727
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:48
- Zuletzt bearbeitet 01.10.2025 20:17:08
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg When len >= INT_MAX - transhdrlen, ulen = len + transhdrlen will be overflow. To fix, we can follow what udpv6 does and subtract the transhdrlen from the max.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version < 4.9.320
Linux ≫ Linux Kernel Version >= 4.10 < 4.14.285
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.249
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.200
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.124
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.49
Linux ≫ Linux Kernel Version >= 5.16 < 5.18.6
Linux ≫ Linux Kernel Version5.19 Updaterc1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.075 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-190 Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.