DEBIAN-CVE-2022-50536

Source
https://security-tracker.debian.org/tracker/CVE-2022-50536
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50536.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-50536
Upstream
Published
2025-10-07T16:15:37Z
Modified
2025-10-10T18:49:11.713097Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix repeated calls to sockput() when msg has moredata In tcpbpfsendverdict() redirection, the eval variable is assigned to _SKREDIRECT after the applybytes data is sent, if msg has moredata, sockput() will be called multiple times. We should reset the eval variable to _SKNONE every time moredata starts. This causes: IPv4: Attempt to release TCP socket in state 1 00000000b4c925d7 ------------[ cut here ]------------ refcountt: addition on 0; use-after-free. WARNING: CPU: 5 PID: 4482 at lib/refcount.c:25 refcountwarnsaturate+0x7d/0x110 Modules linked in: CPU: 5 PID: 4482 Comm: sockhashbypass Kdump: loaded Not tainted 6.0.0 #1 Hardware name: Red Hat KVM, BIOS 1.11.0-2.el7 04/01/2014 Call Trace: <TASK> _tcptransmitskb+0xa1b/0xb90 ? _allocskb+0x8c/0x1a0 ? _kmallocnodetrackcaller+0x184/0x320 tcpwritexmit+0x22a/0x1110 _tcppushpendingframes+0x32/0xf0 dotcpsendpages+0x62d/0x640 tcpbpfpush+0xae/0x2c0 tcpbpfsendmsgredir+0x260/0x410 ? preemptcountadd+0x70/0xa0 tcpbpfsendverdict+0x386/0x4b0 tcpbpfsendmsg+0x21b/0x3b0 socksendmsg+0x58/0x70 _syssendto+0xfa/0x170 ? xfdvalidatestate+0x1d/0x80 ? switchfpureturn+0x59/0xe0 _x64syssendto+0x24/0x30 dosyscall64+0x37/0x90 entrySYSCALL64afterhwframe+0x63/0xcd

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.178-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}