Bug 2373564 (CVE-2022-50071) - CVE-2022-50071 kernel: mptcp: move subflow cleanup in mptcp_destroy_common()
Summary: CVE-2022-50071 kernel: mptcp: move subflow cleanup in mptcp_destroy_common()
Keywords:
Status: NEW
Alias: CVE-2022-50071
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-18 12:08 UTC by OSIDB Bzimport
Modified: 2025-06-24 18:17 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-18 12:08:32 UTC
In the Linux kernel, the following vulnerability has been resolved:

mptcp: move subflow cleanup in mptcp_destroy_common()

If the mptcp socket creation fails due to a CGROUP_INET_SOCK_CREATE
eBPF program, the MPTCP protocol ends-up leaking all the subflows:
the related cleanup happens in __mptcp_destroy_sock() that is not
invoked in such code path.

Address the issue moving the subflow sockets cleanup in the
mptcp_destroy_common() helper, which is invoked in every msk cleanup
path.

Additionally get rid of the intermediate list_splice_init step, which
is an unneeded relic from the past.

The issue is present since before the reported root cause commit, but
any attempt to backport the fix before that hash will require a complete
rewrite.

Comment 1 Avinash Hanwate 2025-06-19 11:36:29 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025061853-CVE-2022-50071-874c@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.