{"id":"CVE-2022-49776","summary":"macvlan: enforce a consistent minimal mtu","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: enforce a consistent minimal mtu\n\nmacvlan should enforce a minimal mtu of 68, even at link creation.\n\nThis patch avoids the current behavior (which could lead to crashes\nin ipv6 stack if the link is brought up)\n\n$ ip link add macvlan1 link eno1 mtu 8 type macvlan  # This should fail !\n$ ip link sh dev macvlan1\n5: macvlan1@eno1: \u003cBROADCAST,MULTICAST\u003e mtu 8 qdisc noop\n    state DOWN mode DEFAULT group default qlen 1000\n    link/ether 02:47:6c:24:74:82 brd ff:ff:ff:ff:ff:ff\n$ ip link set macvlan1 mtu 67\nError: mtu less than device minimum.\n$ ip link set macvlan1 mtu 68\n$ ip link set macvlan1 mtu 8\nError: mtu less than device minimum.","modified":"2026-04-03T13:14:31.733026711Z","published":"2025-05-01T14:09:12.572Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49776.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2b055c719d8f94c15ec9b7659978133030c6a353"},{"type":"WEB","url":"https://git.kernel.org/stable/c/650137a7c0b2892df2e5b0bc112d7b09a78c93c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a62aa84fe19eb24d083d600a074c009a0a66d4f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b64085b00044bdf3cd1c9825e9ef5b2e0feae91a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d2fee7d121d189c6dc905b727d60e7043a6655bb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e41cbf98df22d08402e65174d147cbb187fe1a33"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e929ec98c0c3b10d9c07f3776df0c1a02d7a763e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49776.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49776"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"91572088e3fdbf4fe31cf397926d8b890fdb3237"},{"fixed":"d2fee7d121d189c6dc905b727d60e7043a6655bb"},{"fixed":"650137a7c0b2892df2e5b0bc112d7b09a78c93c8"},{"fixed":"a62aa84fe19eb24d083d600a074c009a0a66d4f3"},{"fixed":"e929ec98c0c3b10d9c07f3776df0c1a02d7a763e"},{"fixed":"e41cbf98df22d08402e65174d147cbb187fe1a33"},{"fixed":"2b055c719d8f94c15ec9b7659978133030c6a353"},{"fixed":"b64085b00044bdf3cd1c9825e9ef5b2e0feae91a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49776.json"}}],"schema_version":"1.7.5"}