
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49727 is a vulnerability in the Linux kernel's IPv6 implementation, specifically in the l2tpip6sendmsg function. The vulnerability was discovered in 2022 and involves a signed integer overflow condition that occurs when handling message lengths in L2TP (Layer 2 Tunneling Protocol) over IPv6 (Debian Security).
The vulnerability occurs in the l2tpip6sendmsg function where a signed integer overflow can happen when len >= INT_MAX - transhdrlen, causing ulen = len + transhdrlen to overflow. The issue exists in the IPv6 implementation of L2TP protocol handling. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (Medium) (NVD, Red Hat).
If exploited, this vulnerability could lead to a signed integer overflow condition in the Linux kernel's network stack, potentially causing memory corruption or system instability when processing L2TP packets over IPv6 (Kernel Commit).
The vulnerability has been fixed by modifying the length check to prevent the overflow condition. The fix follows the same approach as used in UDPv6, by subtracting the transhdrlen from the maximum allowed length. The patch has been incorporated into various Linux kernel versions (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."