CVE-2022-50783Missing Release of Memory after Effective Lifetime in Linux

Severity
6.6MEDIUM
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: mptcp: use proper req destructor for IPv6 Before, only the destructor from TCP request sock in IPv4 was called even if the subflow was IPv6. It is important to use the right destructor to avoid memory leaks with some advanced IPv6 features, e.g. when the request socks contain specific IPv6 options.

Affected Packages4 packages

Linuxlinux/linux_kernel5.6.05.10.163+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux79c0949e9a09f6a14a6dd18dc8396029423f9b686eb02c596ec02e5897ae377e065cb7df55337a96+5
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-7hfj-fw8x-q6p6: In the Linux kernel, the following vulnerability has been resolved: mptcp: use proper req destructor for IPv6 Before, only the destructor from TCP r2025-12-24
OSV
CVE-2022-50783: In the Linux kernel, the following vulnerability has been resolved: mptcp: use proper req destructor for IPv6 Before, only the destructor from TCP req2025-12-24
OSV
mptcp: use proper req destructor for IPv62025-12-24

📋Vendor Advisories

2
Red Hat
kernel: mptcp: use proper req destructor for IPv62025-12-24
Debian
CVE-2022-50783: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: use ...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50783 Impact, Exploitability, and Mitigation Steps | Wiz