CVE-2022-49013: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: sctp: fix memory leak in sctp_stream_outq_migrate() When sctp_stream_outq_migrate() is called to release stream out resources, the memory pointed to by prio_head in stream out is not released. The memory leak information is as follows: unreferenced object 0xffff88801fe79f80 (size 64): comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s) hex dump (first 32 bytes): 80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................ 90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................ backtrace: [<ffffffff81b215c6>] kmalloc_trace+0x26/0x60 [<ffffffff88ae517c>] sctp_sched_prio_set+0x4cc/0x770 [<ffffffff88ad64f2>] sctp_stream_init_ext+0xd2/0x1b0 [<ffffffff88aa2604>] sctp_sendmsg_to_asoc+0x1614/0x1a30 [<ffffffff88ab7ff1>] sctp_sendmsg+0xda1/0x1ef0 [<ffffffff87f765ed>] inet_sendmsg+0x9d/0xe0 [<ffffffff8754b5b3>] sock_sendmsg+0xd3/0x120 [<ffffffff8755446a>] __sys_sendto+0x23a/0x340 [<ffffffff87554651>] __x64_sys_sendto+0xe1/0x1b0 [<ffffffff89978b49>] do_syscall_64+0x39/0xb0 [<ffffffff89a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
AI Analysis
Technical Summary
CVE-2022-49013 is a vulnerability identified in the Linux kernel's implementation of the Stream Control Transmission Protocol (SCTP). Specifically, the issue arises in the function sctp_stream_outq_migrate(), which is responsible for releasing stream output resources. The vulnerability is a memory leak caused by the failure to release memory pointed to by the prio_head pointer within the stream out queue. This results in unreferenced memory objects remaining allocated, which over time can accumulate and degrade system performance or stability. The technical details include a backtrace showing the call stack leading to the leak, involving kernel functions such as kmalloc_trace, sctp_sched_prio_set, sctp_stream_init_ext, and sctp_sendmsg. The leak occurs during the migration or cleanup of SCTP stream output queues, which are used to manage prioritized message sending in SCTP associations. Although no known exploits are reported in the wild, the leak could be triggered by sending SCTP messages, potentially leading to resource exhaustion on affected systems. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it has been publicly disclosed and patched by the Linux project. No CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49013 primarily concerns systems running vulnerable Linux kernel versions with SCTP enabled and in use. SCTP is commonly used in telecommunications infrastructure, signaling systems, and some specialized applications requiring reliable message-oriented transport. A memory leak in the kernel can lead to gradual resource exhaustion, causing degraded system performance, increased latency, or even kernel crashes if memory pressure becomes critical. This can disrupt critical services, especially in telecom operators, internet service providers, and enterprises relying on Linux-based network infrastructure. Although the vulnerability does not directly allow code execution or privilege escalation, the denial-of-service-like effects from memory exhaustion can impact availability and operational continuity. European organizations with large-scale Linux deployments, particularly in network and telecom sectors, are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially if attackers develop targeted triggers. The vulnerability also poses a risk to cloud providers and data centers in Europe using affected Linux kernels, potentially impacting hosted services and customers.
Mitigation Recommendations
To mitigate CVE-2022-49013, European organizations should prioritize updating Linux kernel versions to those containing the patch that fixes the memory leak in sctp_stream_outq_migrate(). Kernel updates should be tested and deployed promptly, especially on systems running SCTP-dependent applications or telecom infrastructure. Organizations should audit their environments to identify systems using SCTP and assess exposure. Where possible, disable SCTP if it is not required to reduce attack surface. Monitoring system memory usage and kernel logs for unusual patterns related to SCTP can help detect exploitation attempts or resource leaks. Implementing resource limits and kernel memory management tuning may help mitigate impact until patches are applied. For critical infrastructure, consider deploying intrusion detection systems capable of SCTP traffic analysis to identify anomalous message patterns that might trigger the leak. Coordination with Linux distribution vendors and telecom equipment providers is recommended to ensure timely patch availability and deployment. Finally, maintain robust backup and recovery procedures to minimize downtime in case of service disruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland, Poland
CVE-2022-49013: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: sctp: fix memory leak in sctp_stream_outq_migrate() When sctp_stream_outq_migrate() is called to release stream out resources, the memory pointed to by prio_head in stream out is not released. The memory leak information is as follows: unreferenced object 0xffff88801fe79f80 (size 64): comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s) hex dump (first 32 bytes): 80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................ 90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................ backtrace: [<ffffffff81b215c6>] kmalloc_trace+0x26/0x60 [<ffffffff88ae517c>] sctp_sched_prio_set+0x4cc/0x770 [<ffffffff88ad64f2>] sctp_stream_init_ext+0xd2/0x1b0 [<ffffffff88aa2604>] sctp_sendmsg_to_asoc+0x1614/0x1a30 [<ffffffff88ab7ff1>] sctp_sendmsg+0xda1/0x1ef0 [<ffffffff87f765ed>] inet_sendmsg+0x9d/0xe0 [<ffffffff8754b5b3>] sock_sendmsg+0xd3/0x120 [<ffffffff8755446a>] __sys_sendto+0x23a/0x340 [<ffffffff87554651>] __x64_sys_sendto+0xe1/0x1b0 [<ffffffff89978b49>] do_syscall_64+0x39/0xb0 [<ffffffff89a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
AI-Powered Analysis
Technical Analysis
CVE-2022-49013 is a vulnerability identified in the Linux kernel's implementation of the Stream Control Transmission Protocol (SCTP). Specifically, the issue arises in the function sctp_stream_outq_migrate(), which is responsible for releasing stream output resources. The vulnerability is a memory leak caused by the failure to release memory pointed to by the prio_head pointer within the stream out queue. This results in unreferenced memory objects remaining allocated, which over time can accumulate and degrade system performance or stability. The technical details include a backtrace showing the call stack leading to the leak, involving kernel functions such as kmalloc_trace, sctp_sched_prio_set, sctp_stream_init_ext, and sctp_sendmsg. The leak occurs during the migration or cleanup of SCTP stream output queues, which are used to manage prioritized message sending in SCTP associations. Although no known exploits are reported in the wild, the leak could be triggered by sending SCTP messages, potentially leading to resource exhaustion on affected systems. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it has been publicly disclosed and patched by the Linux project. No CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49013 primarily concerns systems running vulnerable Linux kernel versions with SCTP enabled and in use. SCTP is commonly used in telecommunications infrastructure, signaling systems, and some specialized applications requiring reliable message-oriented transport. A memory leak in the kernel can lead to gradual resource exhaustion, causing degraded system performance, increased latency, or even kernel crashes if memory pressure becomes critical. This can disrupt critical services, especially in telecom operators, internet service providers, and enterprises relying on Linux-based network infrastructure. Although the vulnerability does not directly allow code execution or privilege escalation, the denial-of-service-like effects from memory exhaustion can impact availability and operational continuity. European organizations with large-scale Linux deployments, particularly in network and telecom sectors, are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially if attackers develop targeted triggers. The vulnerability also poses a risk to cloud providers and data centers in Europe using affected Linux kernels, potentially impacting hosted services and customers.
Mitigation Recommendations
To mitigate CVE-2022-49013, European organizations should prioritize updating Linux kernel versions to those containing the patch that fixes the memory leak in sctp_stream_outq_migrate(). Kernel updates should be tested and deployed promptly, especially on systems running SCTP-dependent applications or telecom infrastructure. Organizations should audit their environments to identify systems using SCTP and assess exposure. Where possible, disable SCTP if it is not required to reduce attack surface. Monitoring system memory usage and kernel logs for unusual patterns related to SCTP can help detect exploitation attempts or resource leaks. Implementing resource limits and kernel memory management tuning may help mitigate impact until patches are applied. For critical infrastructure, consider deploying intrusion detection systems capable of SCTP traffic analysis to identify anomalous message patterns that might trigger the leak. Coordination with Linux distribution vendors and telecom equipment providers is recommended to ensure timely patch availability and deployment. Finally, maintain robust backup and recovery procedures to minimize downtime in case of service disruption.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.644Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6901
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 1:11:24 AM
Last updated: 8/10/2025, 10:24:43 PM
Views: 17
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.