
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-50531 is an information leak vulnerability in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem. The issue was discovered in the tipctopsrvkernsubscr() function, where a failure to properly initialize sub.usrhandle results in four bytes remaining uninitialized when issuing setsockopt(..., SOL_TIPC, ...). This vulnerability was reported by KMSAN (Kernel Memory Sanitizer) when the packet was received (NVD).
The vulnerability occurs in the tipctopsrvkernsubscr() function where an 8-byte write is required to initialize sub.usrhandle. When this initialization is not properly performed, four bytes remain uninitialized during setsockopt operations with SOLTIPC. The issue manifests when copying data to user space through the copyout function in lib/ioviter.c, leading to an information leak that was detected by the Kernel Memory Sanitizer (KMSAN) (NVD).
The vulnerability results in an information leak that could potentially expose sensitive kernel memory contents to user space applications. This type of leak could provide attackers with valuable information about the system's memory layout or sensitive data (NVD).
The vulnerability has been fixed by properly initializing the sub.usrhandle variable in the tipctopsrvkernsubscr() function. Users should update to a patched version of the Linux kernel that includes this fix (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."