CVE-2022-49669
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
26/02/2025
Last modified:
24/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mptcp: fix race on unaccepted mptcp sockets<br />
<br />
When the listener socket owning the relevant request is closed,<br />
it frees the unaccepted subflows and that causes later deletion<br />
of the paired MPTCP sockets.<br />
<br />
The mptcp socket&#39;s worker can run in the time interval between such delete<br />
operations. When that happens, any access to msk->first will cause an UaF<br />
access, as the subflow cleanup did not cleared such field in the mptcp<br />
socket.<br />
<br />
Address the issue explicitly traversing the listener socket accept<br />
queue at close time and performing the needed cleanup on the pending<br />
msk.<br />
<br />
Note that the locking is a bit tricky, as we need to acquire the msk<br />
socket lock, while still owning the subflow socket one.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.18.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



