CVE-2022-49669 PUBLISHED CVSS 7.8 HIGH

Reported by Linux · Published February 26, 2025

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race on unaccepted mptcp sockets When the listener socket owning the relevant request is closed, it frees the unaccepted subflows and that causes later deletion of the paired MPTCP sockets. The mptcp socket's worker can run in the time interval between such delete operations. When that happens, any access to msk->first will cause an UaF access, as the subflow cleanup did not cleared such field in the mptcp socket. Address the issue explicitly traversing the listener socket accept queue at close time and performing the needed cleanup on the pending msk. Note that the locking is a bit tricky, as we need to acquire the msk socket lock, while still owning the subflow socket one.

Risk Scores

CVSS v3.1
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products

VendorProductVersions
LinuxLinux86e39e04482b0aadf3ee3ed5fcf2d63816559d36, 86e39e04482b0aadf3ee3ed5fcf2d63816559d36
LinuxLinux5.17, 0, 5.18.10
LinuxLinux86e39e04482b0aadf3ee3ed5fcf2d63816559d36, 86e39e04482b0aadf3ee3ed5fcf2d63816559d36, 5.17
linuxlinux_kernel5.17, 5.17

Timeline

References

Open in Interactive Console →