CVE-2022-50531
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.76 (inc) |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an information leak in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem. Specifically, it occurs in the function tipc_topsrv_kern_subscr where an 8-byte write was missing to initialize a variable sub.usr_handle. Because only 4 bytes were initialized, 4 bytes remained uninitialized when setsockopt was called with SOL_TIPC. This uninitialized memory was then copied to user space, causing an information leak detected by Kernel Memory Sanitizer (KMSAN).
How can this vulnerability impact me? :
The vulnerability can lead to an information leak where uninitialized kernel memory is exposed to user space. This could potentially allow an attacker with local access to the system to obtain sensitive kernel memory contents, which might aid in further attacks or privilege escalation.