CVE-2022-50536
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.15 |
| linux | linux_kernel | From 5.16 (inc) to 6.0.16 (inc) |
| linux | linux_kernel | 6.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-415 | The product calls free() twice on the same memory address. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the bpf sockmap feature where repeated calls to sock_put() occur when a message has more_data. Specifically, in the tcp_bpf_send_verdict() function, the eval variable is assigned __SK_REDIRECT after sending apply_bytes data, but if more_data is present, sock_put() is called multiple times without resetting eval to __SK_NONE. This leads to attempts to release a TCP socket multiple times, causing a use-after-free error and kernel warnings related to reference counting.
How can this vulnerability impact me? :
This vulnerability can cause a use-after-free condition in the Linux kernel, potentially leading to kernel crashes or instability. It may allow attackers to disrupt normal TCP socket operations, causing denial of service or other unpredictable behavior in systems using the affected kernel versions.