CVE-2022-50536Double Free in Linux

CWE-415Double Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data In tcp_bpf_send_verdict() redirection, the eval variable is assigned to __SK_REDIRECT after the apply_bytes data is sent, if msg has more_data, sock_put() will be called multiple times. We should reset the eval variable to __SK_NONE every time more_data starts. This causes: IPv4: Attempt to release TCP socket in state 1 00000000b4c925d7 ------------[ cut

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.4.1575.4.229+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux5f0bfe21c853917aae4bc5a70fe57ddb4054443e7508b9f4daac4ec7dfe0b6fb2d688b1c1c105e10+7
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50536: In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data In tcp_bpf_s2025-10-07
GHSA
GHSA-x73r-r6qr-625x: In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data In tcp_bpf2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data2025-10-07
Debian
CVE-2022-50536: linux - In the Linux kernel, the following vulnerability has been resolved: bpf, sockma...2022