CVE-2022-49013: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: sctp: fix memory leak in sctp_stream_outq_migrate() When sctp_stream_outq_migrate() is called to release stream out resources, the memory pointed to by prio_head in stream out is not released. The memory leak information is as follows: unreferenced object 0xffff88801fe79f80 (size 64): comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s) hex dump (first 32 bytes): 80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................ 90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................ backtrace: [<ffffffff81b215c6>] kmalloc_trace+0x26/0x60 [<ffffffff88ae517c>] sctp_sched_prio_set+0x4cc/0x770 [<ffffffff88ad64f2>] sctp_stream_init_ext+0xd2/0x1b0 [<ffffffff88aa2604>] sctp_sendmsg_to_asoc+0x1614/0x1a30 [<ffffffff88ab7ff1>] sctp_sendmsg+0xda1/0x1ef0 [<ffffffff87f765ed>] inet_sendmsg+0x9d/0xe0 [<ffffffff8754b5b3>] sock_sendmsg+0xd3/0x120 [<ffffffff8755446a>] __sys_sendto+0x23a/0x340 [<ffffffff87554651>] __x64_sys_sendto+0xe1/0x1b0 [<ffffffff89978b49>] do_syscall_64+0x39/0xb0 [<ffffffff89a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
AI Analysis
Technical Summary
CVE-2022-49013 is a vulnerability identified in the Linux kernel's implementation of the Stream Control Transmission Protocol (SCTP). Specifically, the issue arises in the function sctp_stream_outq_migrate(), which is responsible for releasing stream output resources. The vulnerability is a memory leak caused by the failure to release memory pointed to by the prio_head pointer within the stream out queue. This results in unreferenced memory objects remaining allocated, which over time can accumulate and degrade system performance or stability. The technical details include a backtrace showing the call stack leading to the leak, involving kernel functions such as kmalloc_trace, sctp_sched_prio_set, sctp_stream_init_ext, and sctp_sendmsg. The leak occurs during the migration or cleanup of SCTP stream output queues, which are used to manage prioritized message sending in SCTP associations. Although no known exploits are reported in the wild, the leak could be triggered by sending SCTP messages, potentially leading to resource exhaustion on affected systems. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it has been publicly disclosed and patched by the Linux project. No CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49013 primarily concerns systems running vulnerable Linux kernel versions with SCTP enabled and in use. SCTP is commonly used in telecommunications infrastructure, signaling systems, and some specialized applications requiring reliable message-oriented transport. A memory leak in the kernel can lead to gradual resource exhaustion, causing degraded system performance, increased latency, or even kernel crashes if memory pressure becomes critical. This can disrupt critical services, especially in telecom operators, internet service providers, and enterprises relying on Linux-based network infrastructure. Although the vulnerability does not directly allow code execution or privilege escalation, the denial-of-service-like effects from memory exhaustion can impact availability and operational continuity. European organizations with large-scale Linux deployments, particularly in network and telecom sectors, are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially if attackers develop targeted triggers. The vulnerability also poses a risk to cloud providers and data centers in Europe using affected Linux kernels, potentially impacting hosted services and customers.
Mitigation Recommendations
To mitigate CVE-2022-49013, European organizations should prioritize updating Linux kernel versions to those containing the patch that fixes the memory leak in sctp_stream_outq_migrate(). Kernel updates should be tested and deployed promptly, especially on systems running SCTP-dependent applications or telecom infrastructure. Organizations should audit their environments to identify systems using SCTP and assess exposure. Where possible, disable SCTP if it is not required to reduce attack surface. Monitoring system memory usage and kernel logs for unusual patterns related to SCTP can help detect exploitation attempts or resource leaks. Implementing resource limits and kernel memory management tuning may help mitigate impact until patches are applied. For critical infrastructure, consider deploying intrusion detection systems capable of SCTP traffic analysis to identify anomalous message patterns that might trigger the leak. Coordination with Linux distribution vendors and telecom equipment providers is recommended to ensure timely patch availability and deployment. Finally, maintain robust backup and recovery procedures to minimize downtime in case of service disruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland, Poland
CVE-2022-49013: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: sctp: fix memory leak in sctp_stream_outq_migrate() When sctp_stream_outq_migrate() is called to release stream out resources, the memory pointed to by prio_head in stream out is not released. The memory leak information is as follows: unreferenced object 0xffff88801fe79f80 (size 64): comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s) hex dump (first 32 bytes): 80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................ 90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................ backtrace: [<ffffffff81b215c6>] kmalloc_trace+0x26/0x60 [<ffffffff88ae517c>] sctp_sched_prio_set+0x4cc/0x770 [<ffffffff88ad64f2>] sctp_stream_init_ext+0xd2/0x1b0 [<ffffffff88aa2604>] sctp_sendmsg_to_asoc+0x1614/0x1a30 [<ffffffff88ab7ff1>] sctp_sendmsg+0xda1/0x1ef0 [<ffffffff87f765ed>] inet_sendmsg+0x9d/0xe0 [<ffffffff8754b5b3>] sock_sendmsg+0xd3/0x120 [<ffffffff8755446a>] __sys_sendto+0x23a/0x340 [<ffffffff87554651>] __x64_sys_sendto+0xe1/0x1b0 [<ffffffff89978b49>] do_syscall_64+0x39/0xb0 [<ffffffff89a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
AI-Powered Analysis
Technical Analysis
CVE-2022-49013 is a vulnerability identified in the Linux kernel's implementation of the Stream Control Transmission Protocol (SCTP). Specifically, the issue arises in the function sctp_stream_outq_migrate(), which is responsible for releasing stream output resources. The vulnerability is a memory leak caused by the failure to release memory pointed to by the prio_head pointer within the stream out queue. This results in unreferenced memory objects remaining allocated, which over time can accumulate and degrade system performance or stability. The technical details include a backtrace showing the call stack leading to the leak, involving kernel functions such as kmalloc_trace, sctp_sched_prio_set, sctp_stream_init_ext, and sctp_sendmsg. The leak occurs during the migration or cleanup of SCTP stream output queues, which are used to manage prioritized message sending in SCTP associations. Although no known exploits are reported in the wild, the leak could be triggered by sending SCTP messages, potentially leading to resource exhaustion on affected systems. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it has been publicly disclosed and patched by the Linux project. No CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49013 primarily concerns systems running vulnerable Linux kernel versions with SCTP enabled and in use. SCTP is commonly used in telecommunications infrastructure, signaling systems, and some specialized applications requiring reliable message-oriented transport. A memory leak in the kernel can lead to gradual resource exhaustion, causing degraded system performance, increased latency, or even kernel crashes if memory pressure becomes critical. This can disrupt critical services, especially in telecom operators, internet service providers, and enterprises relying on Linux-based network infrastructure. Although the vulnerability does not directly allow code execution or privilege escalation, the denial-of-service-like effects from memory exhaustion can impact availability and operational continuity. European organizations with large-scale Linux deployments, particularly in network and telecom sectors, are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially if attackers develop targeted triggers. The vulnerability also poses a risk to cloud providers and data centers in Europe using affected Linux kernels, potentially impacting hosted services and customers.
Mitigation Recommendations
To mitigate CVE-2022-49013, European organizations should prioritize updating Linux kernel versions to those containing the patch that fixes the memory leak in sctp_stream_outq_migrate(). Kernel updates should be tested and deployed promptly, especially on systems running SCTP-dependent applications or telecom infrastructure. Organizations should audit their environments to identify systems using SCTP and assess exposure. Where possible, disable SCTP if it is not required to reduce attack surface. Monitoring system memory usage and kernel logs for unusual patterns related to SCTP can help detect exploitation attempts or resource leaks. Implementing resource limits and kernel memory management tuning may help mitigate impact until patches are applied. For critical infrastructure, consider deploying intrusion detection systems capable of SCTP traffic analysis to identify anomalous message patterns that might trigger the leak. Coordination with Linux distribution vendors and telecom equipment providers is recommended to ensure timely patch availability and deployment. Finally, maintain robust backup and recovery procedures to minimize downtime in case of service disruption.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.644Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6901
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 1:11:24 AM
Last updated: 12/2/2025, 9:01:20 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumCVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.