Linux Kernel Vulnerability Affecting UDP Segmentation
CVE-2022-50365

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
17 September 2025

What is CVE-2022-50365?

In the Linux kernel, a vulnerability exists that affects the handling of tail adjustments during pull operations. This issue arises when a program utilizes a helper function like BPF_FUNC_skb_pull_data to access partial content that exceeds the head length of a socket buffer (skb). If all socket buffers in the Generic Segmentation Offload (GSO) fragment list are linear without a head fragment, it can lead to unexpected behaviors, including potential kernel bugs, as observed in specific operations like UDP packet segmentation. To address this issue, there is a need to mark packets accordingly to handle tail updates properly.

Affected Version(s)

Linux 162a5a8c3aff15c449e6b38355cdf80ab4f77a5a

Linux 55fb612bef7fd237fb70068e2b6ff1cd1543a8ef < 6ac417d71b80e74b002313fcd73f7e9008e8e457

Linux 821302dd0c51d29269ef73a595bdff294419e2cd < 2d59f0ca153e9573ec4f140988c0ccca0eb4181b

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-50365 : Linux Kernel Vulnerability Affecting UDP Segmentation