CVE-2022-50865 — Integer Overflow or Wraparound in Linux
Severity
7.5HIGH
No vectorEPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and
in tcp_add_backlog(), the variable limit is caculated by adding
sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value
of int and overflow. This patch reduces the limit budget by
halving the sndbuf to solve this issue since ACK packets are much
smaller than the payload.
Affected Packages4 packages
▶CVEListV5linux/linuxc9c3321257e1b95be9b375f811fb250162af8d39 — 9d04b4d0feee12bce6bfe37f30d8e953d3c30368+5
🔴Vulnerability Details
3OSV▶
CVE-2022-50865: In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf↗2025-12-30
GHSA▶
GHSA-2qmc-x97c-8pmc: In the Linux kernel, the following vulnerability has been resolved:
tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
The type of sk_rcvbu↗2025-12-30