CVE-2022-50531 — Missing Release of Memory after Effective Lifetime in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Latest updateApr 19
Description
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix an information leak in tipc_topsrv_kern_subscr
Use a 8-byte write to initialize sub.usr_handle in
tipc_topsrv_kern_subscr(), otherwise four bytes remain uninitialized
when issuing setsockopt(..., SOL_TIPC, ...).
This resulted in an infoleak reported by KMSAN when the packet was
received:
BUG: KMSAN: kernel-infoleak in copyout+0xbc/0x100 lib/iov_iter.c:169
instrument_copy_to_user ./include/linux/instrumented.h:121
co…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linux026321c6d056a54b4145522492245d2b5913ee1d — 3d1b83ff7b6575a4e41283203e6b2e25ea700cd7+6
Patches
🔴Vulnerability Details
3VulDB▶
Linux Kernel up to 6.0.5 tipc lib/iov_iter.c tipc_topsrv_kern_subscr information disclosure (Nessus ID 302405 / WID-SEC-2025-2229)↗2026-04-19
OSV▶
CVE-2022-50531: In the Linux kernel, the following vulnerability has been resolved: tipc: fix an information leak in tipc_topsrv_kern_subscr Use a 8-byte write to ini↗2025-10-07
GHSA▶
GHSA-rf5c-crcv-v9wg: In the Linux kernel, the following vulnerability has been resolved:
tipc: fix an information leak in tipc_topsrv_kern_subscr
Use a 8-byte write to i↗2025-10-07