CVE-2022-50365 — Buffer Access with Incorrect Length Value in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 17
Description
In the Linux kernel, the following vulnerability has been resolved:
skbuff: Account for tail adjustment during pull operations
Extending the tail can have some unexpected side effects if a program uses
a helper like BPF_FUNC_skb_pull_data to read partial content beyond the
head skb headlen when all the skbs in the gso frag_list are linear with no
head_frag -
kernel BUG at net/core/skbuff.c:4219!
pc : skb_segment+0xcf4/0xd2c
lr : skb_segment+0x63c/0xd2c
Call trace:
skb_segment+0xcf4/0xd2c
__ud…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linux162a5a8c3aff15c449e6b38355cdf80ab4f77a5a — ff3743d00f41d803e6ab9334962b674f3b7fd0cb+10
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-56h4-267j-35wc: In the Linux kernel, the following vulnerability has been resolved:
skbuff: Account for tail adjustment during pull operations
Extending the tail ca↗2025-09-17
OSV▶
CVE-2022-50365: In the Linux kernel, the following vulnerability has been resolved: skbuff: Account for tail adjustment during pull operations Extending the tail can↗2025-09-17
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2022-50365 kernel: Linux kernel: Local denial of service in skbuff due to improper network buffer handling↗2025-09-17