Логотип exploitDog
bind:CVE-2022-50865
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-50865

Количество 9

Количество 9

ubuntu логотип

CVE-2022-50865

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

EPSS: Низкий
redhat логотип

CVE-2022-50865

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-50865

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

EPSS: Низкий
debian логотип

CVE-2022-50865

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: t ...

EPSS: Низкий
github логотип

GHSA-2qmc-x97c-8pmc

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

EPSS: Низкий
fstec логотип

BDU:2026-02418

больше 3 лет назад

Уязвимость функции tcp_add_backlog() модуля net/ipv4/tcp_ipv4.c реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2026:1662

около 1 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1662

около 2 месяцев назад

ELSA-2026-1662: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0473-1

около 1 месяца назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-50865

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2022-50865

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

CVSS3: 7.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2022-50865

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

0%
Низкий
3 месяца назад
debian логотип
CVE-2022-50865

In the Linux kernel, the following vulnerability has been resolved: t ...

0%
Низкий
3 месяца назад
github логотип
GHSA-2qmc-x97c-8pmc

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2026-02418

Уязвимость функции tcp_add_backlog() модуля net/ipv4/tcp_ipv4.c реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
rocky логотип
RLSA-2026:1662

Moderate: kernel security update

около 1 месяца назад
oracle-oval логотип
ELSA-2026-1662

ELSA-2026-1662: kernel security update (MODERATE)

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0473-1

Security update for the Linux Kernel

около 1 месяца назад

Уязвимостей на страницу