Skip to main content

CVE-2022-49013: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49013cvecve-2022-49013
Published: Mon Oct 21 2024 (10/21/2024, 20:06:23 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: sctp: fix memory leak in sctp_stream_outq_migrate() When sctp_stream_outq_migrate() is called to release stream out resources, the memory pointed to by prio_head in stream out is not released. The memory leak information is as follows: unreferenced object 0xffff88801fe79f80 (size 64): comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s) hex dump (first 32 bytes): 80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................ 90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................ backtrace: [<ffffffff81b215c6>] kmalloc_trace+0x26/0x60 [<ffffffff88ae517c>] sctp_sched_prio_set+0x4cc/0x770 [<ffffffff88ad64f2>] sctp_stream_init_ext+0xd2/0x1b0 [<ffffffff88aa2604>] sctp_sendmsg_to_asoc+0x1614/0x1a30 [<ffffffff88ab7ff1>] sctp_sendmsg+0xda1/0x1ef0 [<ffffffff87f765ed>] inet_sendmsg+0x9d/0xe0 [<ffffffff8754b5b3>] sock_sendmsg+0xd3/0x120 [<ffffffff8755446a>] __sys_sendto+0x23a/0x340 [<ffffffff87554651>] __x64_sys_sendto+0xe1/0x1b0 [<ffffffff89978b49>] do_syscall_64+0x39/0xb0 [<ffffffff89a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

AI-Powered Analysis

AILast updated: 07/01/2025, 01:11:24 UTC

Technical Analysis

CVE-2022-49013 is a vulnerability identified in the Linux kernel's implementation of the Stream Control Transmission Protocol (SCTP). Specifically, the issue arises in the function sctp_stream_outq_migrate(), which is responsible for releasing stream output resources. The vulnerability is a memory leak caused by the failure to release memory pointed to by the prio_head pointer within the stream out queue. This results in unreferenced memory objects remaining allocated, which over time can accumulate and degrade system performance or stability. The technical details include a backtrace showing the call stack leading to the leak, involving kernel functions such as kmalloc_trace, sctp_sched_prio_set, sctp_stream_init_ext, and sctp_sendmsg. The leak occurs during the migration or cleanup of SCTP stream output queues, which are used to manage prioritized message sending in SCTP associations. Although no known exploits are reported in the wild, the leak could be triggered by sending SCTP messages, potentially leading to resource exhaustion on affected systems. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it has been publicly disclosed and patched by the Linux project. No CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2022-49013 primarily concerns systems running vulnerable Linux kernel versions with SCTP enabled and in use. SCTP is commonly used in telecommunications infrastructure, signaling systems, and some specialized applications requiring reliable message-oriented transport. A memory leak in the kernel can lead to gradual resource exhaustion, causing degraded system performance, increased latency, or even kernel crashes if memory pressure becomes critical. This can disrupt critical services, especially in telecom operators, internet service providers, and enterprises relying on Linux-based network infrastructure. Although the vulnerability does not directly allow code execution or privilege escalation, the denial-of-service-like effects from memory exhaustion can impact availability and operational continuity. European organizations with large-scale Linux deployments, particularly in network and telecom sectors, are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially if attackers develop targeted triggers. The vulnerability also poses a risk to cloud providers and data centers in Europe using affected Linux kernels, potentially impacting hosted services and customers.

Mitigation Recommendations

To mitigate CVE-2022-49013, European organizations should prioritize updating Linux kernel versions to those containing the patch that fixes the memory leak in sctp_stream_outq_migrate(). Kernel updates should be tested and deployed promptly, especially on systems running SCTP-dependent applications or telecom infrastructure. Organizations should audit their environments to identify systems using SCTP and assess exposure. Where possible, disable SCTP if it is not required to reduce attack surface. Monitoring system memory usage and kernel logs for unusual patterns related to SCTP can help detect exploitation attempts or resource leaks. Implementing resource limits and kernel memory management tuning may help mitigate impact until patches are applied. For critical infrastructure, consider deploying intrusion detection systems capable of SCTP traffic analysis to identify anomalous message patterns that might trigger the leak. Coordination with Linux distribution vendors and telecom equipment providers is recommended to ensure timely patch availability and deployment. Finally, maintain robust backup and recovery procedures to minimize downtime in case of service disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-22T01:27:53.644Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6901

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/1/2025, 1:11:24 AM

Last updated: 8/10/2025, 10:24:43 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats