
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2022-50071) was identified in the Linux kernel related to memory management in the MPTCP (Multipath TCP) protocol implementation. The issue occurs when MPTCP socket creation fails due to a CGROUP_INET_SOCK_CREATE eBPF program, resulting in a memory leak of all subflows (NVD, Wiz).
The vulnerability stems from a cleanup process that occurs in __mptcp_destroy_sock() which is not invoked in the failure code path. The issue specifically relates to subflow sockets cleanup that should happen in mptcp_destroy_common() helper, which is invoked in every msk cleanup path. The technical resolution involved moving the subflow sockets cleanup to mptcp_destroy_common() and removing an unnecessary list_splice_init step (NVD, Wiz).
When exploited, this vulnerability results in memory leaks of all subflows when MPTCP socket creation fails. This could potentially lead to resource exhaustion and degraded system performance over time (Wiz).
The issue has been resolved by moving the subflow sockets cleanup process to the mptcp_destroy_common() helper function, ensuring proper cleanup in all msk cleanup paths. Additionally, an unnecessary list_splice_init step was removed as part of the fix (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."