CVE-2022-50783

Source
https://cve.org/CVERecord?id=CVE-2022-50783
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50783.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50783
Downstream
Published
2025-12-24T13:06:10.602Z
Modified
2026-03-20T11:47:37.056117Z
Summary
mptcp: use proper req destructor for IPv6
Details

In the Linux kernel, the following vulnerability has been resolved:

mptcp: use proper req destructor for IPv6

Before, only the destructor from TCP request sock in IPv4 was called even if the subflow was IPv6.

It is important to use the right destructor to avoid memory leaks with some advanced IPv6 features, e.g. when the request socks contain specific IPv6 options.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50783.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
79c0949e9a09f6a14a6dd18dc8396029423f9b68
Fixed
6eb02c596ec02e5897ae377e065cb7df55337a96
Fixed
bd5dc96fea4edd16d2e22f41b4dd50a4cfbeb919
Fixed
092953f3c4cd65f88b27b87a922f6c725f34ee04
Fixed
1922ea6b0ae2ea0c9a09be0eafafe1cd1069d259
Fixed
d3295fee3c756ece33ac0d935e172e68c0a4161b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50783.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.18
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50783.json"