-
CVE-2022-50783
- EPSS 0.03%
- Veröffentlicht 24.12.2025 13:06:10
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: mptcp: use proper req destructor for IPv6 Before, only the destructor from TCP request sock in IPv4 was called even if the subflow was IPv6. It is important to use the right destructor to avoid memory leaks with some advanced IPv6 features, e.g. when the request socks contain specific IPv6 options.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
6eb02c596ec02e5897ae377e065cb7df55337a96
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Status
affected
Version <
bd5dc96fea4edd16d2e22f41b4dd50a4cfbeb919
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Status
affected
Version <
092953f3c4cd65f88b27b87a922f6c725f34ee04
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Status
affected
Version <
1922ea6b0ae2ea0c9a09be0eafafe1cd1069d259
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Status
affected
Version <
d3295fee3c756ece33ac0d935e172e68c0a4161b
Version
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.6
Status
affected
Version <
5.6
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.18
Status
unaffected
Version <=
6.1.*
Version
6.1.4
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.065 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|