CVE-2022-48910

Source
https://cve.org/CVERecord?id=CVE-2022-48910
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48910.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48910
Downstream
Related
Published
2024-08-22T01:30:54.351Z
Modified
2026-03-20T12:22:00.291577Z
Summary
net: ipv6: ensure we call ipv6_mc_down() at most once
Details

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: ensure we call ipv6mcdown() at most once

There are two reasons for addrconfnotify() to be called with NETDEVDOWN: either the network device is actually going down, or IPv6 was disabled on the interface.

If either of them stays down while the other is toggled, we repeatedly call the code for NETDEVDOWN, including ipv6mcdown(), while never calling the corresponding ipv6mcup() in between. This will cause a new entry in idev->mctomb to be allocated for each multicast group the interface is subscribed to, which in turn leaks one struct ifmcaddr6 per nontrivial multicast group the interface is subscribed to.

The following reproducer will leak at least $n objects:

ip addr add ff2e::4242/32 dev eth0 autojoin sysctl -w net.ipv6.conf.eth0.disable_ipv6=1 for i in $(seq 1 $n); do ip link set up eth0; ip link set down eth0 done

Joining groups with IPV6ADDMEMBERSHIP (unprivileged) or setting the sysctl net.ipv6.conf.eth0.forwarding to 1 (=> subscribing to ff02::2) can also be used to create a nontrivial idev->mc_list, which will the leak objects with the right up-down-sequence.

Based on both sources for NETDEV_DOWN events the interface IPv6 state should be considered:

  • not ready if the network interface is not ready OR IPv6 is disabled for it
  • ready if the network interface is ready AND IPv6 is enabled for it

The functions ipv6mcup() and ipv6_down() should only be run when this state changes.

Implement this by remembering when the IPv6 state is ready, and only run ipv6mcdown() if it actually changed from ready to not ready.

The other direction (not ready -> ready) already works correctly, as:

  • the interface notification triggered codepath for NETDEVUP / NETDEVCHANGE returns early if ipv6 is disabled, and
  • the disableipv6=0 triggered codepath skips fully initializing the interface as long as addrconflink_ready(dev) returns false
  • calling ipv6mcup() repeatedly does not leak anything
Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48910.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36
Fixed
9a8736b2da28b24f01707f592ff059b9f90a058c
Fixed
c71bf3229f9e9dd60ba02f5a5be02066edf57012
Fixed
24888915364cfa410de62d8abb5df95c3b67455d
Fixed
9588ac2eddc2f223ebcebf6e9f5caed84d32922b
Fixed
f4c63b24dea9cc2043ff845dcca9aaf8109ea38a
Fixed
b11781515208dd31fbcd0b664078dce5dc44523f
Fixed
72124e65a70b84e6303a5cd21b0ac1f27d7d61a4
Fixed
9995b408f17ff8c7f11bc725c8aa225ba3a63b1c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48910.json"