CVE-2022-50816 — Improper Input Validation in Linux
Severity
4.7MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
ipv6: ensure sane device mtu in tunnels
Another syzbot report [1] with no reproducer hints
at a bug in ip6_gre tunnel (dev:ip6gretap0)
Since ipv6 mcast code makes sure to read dev->mtu once
and applies a sanity check on it (see commit b9b312a7a451
"ipv6: mcast: better catch silly mtu values"), a remaining
possibility is that a layer is able to set dev->mtu to
an underflowed value (high order bit set).
This could happen indee…
Affected Packages4 packages
▶CVEListV5linux/linuxc12b395a46646bab69089ce7016ac78177f6001f — 2bab6fa449d16af36d9c9518865f783a15f446c7+7
🔴Vulnerability Details
3GHSA▶
GHSA-p2cq-487q-r77f: In the Linux kernel, the following vulnerability has been resolved:
ipv6: ensure sane device mtu in tunnels
Another syzbot report [1] with no reprod↗2025-12-30
OSV▶
CVE-2022-50816: In the Linux kernel, the following vulnerability has been resolved: ipv6: ensure sane device mtu in tunnels Another syzbot report [1] with no reproduc↗2025-12-30