CVE-2022-50749
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2025
Last modified:
24/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
acct: fix potential integer overflow in encode_comp_t()<br />
<br />
The integer overflow is descripted with following codes:<br />
> 317 static comp_t encode_comp_t(u64 value)<br />
> 318 {<br />
> 319 int exp, rnd;<br />
......<br />
> 341 exp 343 return exp;<br />
> 344 }<br />
<br />
Currently comp_t is defined as type of &#39;__u16&#39;, but the variable &#39;exp&#39; is<br />
type of &#39;int&#39;, so overflow would happen when variable &#39;exp&#39; in line 343 is<br />
greater than 65535.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0aac6e60c464a5f942f995428e67f8ae1c422250
- https://git.kernel.org/stable/c/1750a0983c455a9b3badd848471fc8d58cb61f67
- https://git.kernel.org/stable/c/2224897d8187dc22a83e05d9361efcccf67bcf12
- https://git.kernel.org/stable/c/6edd0cdee5780fd5f43356b72b29a2a6d48ef6da
- https://git.kernel.org/stable/c/a815a3e019456c94b03bd183e7ac22fd29e9e6fd
- https://git.kernel.org/stable/c/c5f31c655bcc01b6da53b836ac951c1556245305
- https://git.kernel.org/stable/c/cf60bbca1b83a7e0927e36dbf178328982927886
- https://git.kernel.org/stable/c/e93f995a591c352d35d89c518c54f790e1537754
- https://git.kernel.org/stable/c/ebe16676e1dcaa4556ec4d36ca40c82e99e88cfa



