CVE-2022-49669

Updated: 2025-08-20 01:50:38.828279

Description:

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race on unaccepted mptcp sockets When the listener socket owning the relevant request is closed, it frees the unaccepted subflows and that causes later deletion of the paired MPTCP sockets. The mptcp socket's worker can run in the time interval between such delete operations. When that happens, any access to msk->first will cause an UaF access, as the subflow cleanup did not cleared such field in the mptcp socket. Address the issue explicitly traversing the listener socket accept queue at close time and performing the needed cleanup on the pending msk. Note that the locking is a bit tricky, as we need to acquire the msk socket lock, while still owning the subflow socket one.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1753297988 2025-07-24 01:56:33
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1753298320 2025-07-24 01:56:35
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Already Fixed 2025-06-25 02:56:21