CVE-2022-50070
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's Multipath TCP (mptcp) implementation occurs because data can be queued on subflows that have already been closed. Specifically, a race condition exists where an mptcp-level retransmit can happen concurrently with the closing of a subflow, and the packet scheduler checks the subflow state before acquiring the socket lock. This can lead to attempts to retransmit data on a closed subflow socket, causing kernel warnings or crashes. The fix involves rechecking the subflow socket status while holding the socket lock and adding missing checks for fallback-to-TCP cases.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings or crashes (kernel panics) due to attempts to retransmit data on closed subflows in the mptcp implementation. This can lead to system instability or denial of service on affected Linux systems using Multipath TCP.