-
CVE-2022-50783
- EPSS 0.04%
- Veröffentlicht 24.12.2025 13:06:10
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
mptcp: use proper req destructor for IPv6
In the Linux kernel, the following vulnerability has been resolved: mptcp: use proper req destructor for IPv6 Before, only the destructor from TCP request sock in IPv4 was called even if the subflow was IPv6. It is important to use the right destructor to avoid memory leaks with some advanced IPv6 features, e.g. when the request socks contain specific IPv6 options.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Version <
6eb02c596ec02e5897ae377e065cb7df55337a96
Status
affected
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Version <
bd5dc96fea4edd16d2e22f41b4dd50a4cfbeb919
Status
affected
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Version <
092953f3c4cd65f88b27b87a922f6c725f34ee04
Status
affected
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Version <
1922ea6b0ae2ea0c9a09be0eafafe1cd1069d259
Status
affected
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Version <
d3295fee3c756ece33ac0d935e172e68c0a4161b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.6
Status
affected
Version
0
Version <
5.6
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.18
Status
unaffected
Version <=
6.1.*
Version
6.1.4
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.101 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|