Home

Description

In the Linux kernel, the following vulnerability has been resolved: acct: fix potential integer overflow in encode_comp_t() The integer overflow is descripted with following codes: > 317 static comp_t encode_comp_t(u64 value) > 318 { > 319 int exp, rnd; ...... > 341 exp <<= MANTSIZE; > 342 exp += value; > 343 return exp; > 344 } Currently comp_t is defined as type of '__u16', but the variable 'exp' is type of 'int', so overflow would happen when variable 'exp' in line 343 is greater than 65535.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e93f995a591c352d35d89c518c54f790e1537754
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before cf60bbca1b83a7e0927e36dbf178328982927886
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1750a0983c455a9b3badd848471fc8d58cb61f67
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a815a3e019456c94b03bd183e7ac22fd29e9e6fd
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 6edd0cdee5780fd5f43356b72b29a2a6d48ef6da
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ebe16676e1dcaa4556ec4d36ca40c82e99e88cfa
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 2224897d8187dc22a83e05d9361efcccf67bcf12
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 0aac6e60c464a5f942f995428e67f8ae1c422250
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before c5f31c655bcc01b6da53b836ac951c1556245305
affected

Default status
affected

4.9.337 (semver)
unaffected

4.14.303 (semver)
unaffected

4.19.270 (semver)
unaffected

5.4.229 (semver)
unaffected

5.10.163 (semver)
unaffected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/e93f995a591c352d35d89c518c54f790e1537754

git.kernel.org/...c/cf60bbca1b83a7e0927e36dbf178328982927886

git.kernel.org/...c/1750a0983c455a9b3badd848471fc8d58cb61f67

git.kernel.org/...c/a815a3e019456c94b03bd183e7ac22fd29e9e6fd

git.kernel.org/...c/6edd0cdee5780fd5f43356b72b29a2a6d48ef6da

git.kernel.org/...c/ebe16676e1dcaa4556ec4d36ca40c82e99e88cfa

git.kernel.org/...c/2224897d8187dc22a83e05d9361efcccf67bcf12

git.kernel.org/...c/0aac6e60c464a5f942f995428e67f8ae1c422250

git.kernel.org/...c/c5f31c655bcc01b6da53b836ac951c1556245305

cve.org (CVE-2022-50749)

nvd.nist.gov (CVE-2022-50749)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.