CVE-2022-50838

Source
https://cve.org/CVERecord?id=CVE-2022-50838
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50838.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50838
Downstream
Related
Published
2025-12-30T12:10:57.721Z
Modified
2026-04-02T08:28:47.210952Z
Summary
net: stream: purge sk_error_queue in sk_stream_kill_queues()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: stream: purge skerrorqueue in skstreamkill_queues()

Changheon Lee reported TCP socket leaks, with a nice repro.

It seems we leak TCP sockets with the following sequence:

1) SOFTIMESTAMPINGTX_ACK is enabled on the socket.

Each ACK will cook an skb put in error queue, from __skbtstamptx(). __skbtstamptx() is using skbclone(), unless SOFTIMESTAMPINGOPTTSONLY was also requested.

2) If the application is also using MSGZEROCOPY, then we put in the error queue cloned skbs that had a struct ubufinfo attached to them.

Whenever an struct ubufinfo is allocated, sockzerocopyalloc() does a sockhold().

As long as the cloned skbs are still in skerrorqueue, socket refcount is kept elevated.

3) Application closes the socket, while error queue is not empty.

Since tcp_close() no longer purges the socket error queue, we might end up with a TCP socket with at least one skb in error queue keeping the socket alive forever.

This bug can be (ab)used to consume all kernel memory and freeze the host.

We need to purge the error queue, with proper synchronization against concurrent writers.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50838.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7737b104c211fa843de268b897d601e070292a72
Fixed
c8c1eec578a9ae2dc8f14a1846942a0b7bf29d1d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
89be5c357de34718eaaaefed80737f432c5ab86f
Fixed
bab542cf56fc174c8447c00b73be99ffd66d2d39
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8b8b3d738e450d2c2ccdc75f0ab5a951746c2a96
Fixed
6f00bd0402a1e3d2d556afba57c045bd7931e4d3
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b631c603b5fb98d2bd709c35d384901965a3dd51
Fixed
4f1d37ff4226eb99d6b69e9f4518e279e1a851bf
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
daf15fa1fd997749e881aedd9f03f73a11240e82
Fixed
9062493811676ee0efe6c74d98f00ca38c4e17d4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3988164fe9ddf98ebf5b5cdede91ac38c5f08a7e
Fixed
9da204cd67c4fe97e8aa465d10d5c2e7076f7f42
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
24bcbe1cc69fa52dc4f7b5b2456678ed464724d8
Fixed
8c330c36b3970d0917f48827fa6c7a9c75aa4602
Fixed
b458d349f8753f666233828ebd30df6f100cf7d5
Fixed
e0c8bccd40fc1c19e1d246c39bcf79e357e1ada3
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
6ba975e14f5ebb87143d737c493adf4031409a68
Last affected
4437f3ead9e85c35fe0e3adfb98c0b97eaa267eb

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50838.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.337
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.303
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.270
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50838.json"