SB20251230279 - Integer overflow in Linux kernel ipv4
Published: December 30, 2025 Updated: December 30, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2022-50865)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the tcp_add_backlog() function in net/ipv4/tcp_ipv4.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/28addf029417d53b1df062b4c87feb7bc033cb5f
- https://git.kernel.org/stable/c/4f23cb2be530785db284a685d1b1c30224d8a538
- https://git.kernel.org/stable/c/9d04b4d0feee12bce6bfe37f30d8e953d3c30368
- https://git.kernel.org/stable/c/a85d39f14aa8a71e29cfb5eb5de02878a8779898
- https://git.kernel.org/stable/c/ec791d8149ff60c40ad2074af3b92a39c916a03f
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.153
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.77
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.278
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1