CVE-2022-50071
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Multipath TCP (MPTCP) implementation. When the creation of an MPTCP socket fails due to a CGROUP_INET_SOCK_CREATE eBPF program, the protocol leaks all the subflows because the cleanup function __mptcp_destroy_sock() is not called in this failure path. The fix involves moving the subflow sockets cleanup to the mptcp_destroy_common() helper, which is invoked in every socket cleanup path, preventing the leak.
How can this vulnerability impact me? :
The vulnerability can lead to resource leaks in the Linux kernel's MPTCP implementation, specifically leaking subflow sockets when socket creation fails. This could potentially cause increased resource consumption, leading to degraded system performance or denial of service due to exhaustion of socket resources.