๐Ÿ” CVE Alert

CVE-2022-49209

MEDIUM 5.5

bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full If tcp_bpf_sendmsg() is running while sk msg is full. When sk_msg_alloc() returns -ENOMEM error, tcp_bpf_sendmsg() goes to wait_for_memory. If partial memory has been alloced by sk_msg_alloc(), that is, msg_tx->sg.size is greater than osize after sk_msg_alloc(), memleak occurs. To fix we use sk_msg_trim() to release the allocated memory, then goto wait for memory. Other call paths of sk_msg_alloc() have the similar issue, such as tls_sw_sendmsg(), so handle sk_msg_trim logic inside sk_msg_alloc(), as Cong Wang suggested. This issue can cause the following info: WARNING: CPU: 3 PID: 7950 at net/core/stream.c:208 sk_stream_kill_queues+0xd4/0x1a0 Call Trace: <TASK> inet_csk_destroy_sock+0x55/0x110 __tcp_close+0x279/0x470 tcp_close+0x1f/0x60 inet_release+0x3f/0x80 __sock_release+0x3d/0xb0 sock_close+0x11/0x20 __fput+0x92/0x250 task_work_run+0x6a/0xa0 do_exit+0x33b/0xb60 do_group_exit+0x2f/0xa0 get_signal+0xb6/0x950 arch_do_signal_or_restart+0xac/0x2a0 exit_to_user_mode_prepare+0xa9/0x200 syscall_exit_to_user_mode+0x12/0x30 do_syscall_64+0x46/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae </TASK> WARNING: CPU: 3 PID: 2094 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x13c/0x260 Call Trace: <TASK> __sk_destruct+0x24/0x1f0 sk_psock_destroy+0x19b/0x1c0 process_one_work+0x1b3/0x3c0 kthread+0xe6/0x110 ret_from_fork+0x22/0x30 </TASK>

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
604326b41a6fb9b4a78b6179335decee0365cd8c < 6d03722c34d9603df325f67c6d30dc1b7b3c6067 604326b41a6fb9b4a78b6179335decee0365cd8c < bec34a91eba3483e1830c02bdd36f8f968642047 604326b41a6fb9b4a78b6179335decee0365cd8c < de3a8d8fab0710186f7864ec812836d8d70da3c9 604326b41a6fb9b4a78b6179335decee0365cd8c < f677328f05f52d535cbdc15cb04476db49477eb4 604326b41a6fb9b4a78b6179335decee0365cd8c < d0b85dfc6f01d26808e2576c6537c131b590e270 604326b41a6fb9b4a78b6179335decee0365cd8c < 9c34e38c4a870eb30b13f42f5b44f42e9d19ccb8
Linux / Linux
4.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6d03722c34d9603df325f67c6d30dc1b7b3c6067 git.kernel.org: https://git.kernel.org/stable/c/bec34a91eba3483e1830c02bdd36f8f968642047 git.kernel.org: https://git.kernel.org/stable/c/de3a8d8fab0710186f7864ec812836d8d70da3c9 git.kernel.org: https://git.kernel.org/stable/c/f677328f05f52d535cbdc15cb04476db49477eb4 git.kernel.org: https://git.kernel.org/stable/c/d0b85dfc6f01d26808e2576c6537c131b590e270 git.kernel.org: https://git.kernel.org/stable/c/9c34e38c4a870eb30b13f42f5b44f42e9d19ccb8