CVE-2022-50865

Updated: 2026-01-08 03:30:16.619852

Description:

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.5 HIGH Released CLSA-2026:1771239384 2026-02-16 15:54:10
CentOS 8.4 ELS kernel 4.18.0 7.5 HIGH Needs Triage 2026-02-02 14:27:32
CentOS 8.5 ELS kernel 4.18.0 7.5 HIGH In Testing 2026-02-07 05:02:02
CentOS Stream 8 ELS kernel 4.18.0 7.5 HIGH Needs Triage 2026-02-02 14:27:34