CVE-2024-53122
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
02/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust<br />
<br />
Additional active subflows - i.e. created by the in kernel path<br />
manager - are included into the subflow list before starting the<br />
3whs.<br />
<br />
A racing recvmsg() spooling data received on an already established<br />
subflow would unconditionally call tcp_cleanup_rbuf() on all the<br />
current subflows, potentially hitting a divide by zero error on<br />
the newly created ones.<br />
<br />
Explicitly check that the subflow is in a suitable state before<br />
invoking tcp_cleanup_rbuf().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 6.1.119 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.63 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0a9a182ea5c7bb0374e527130fd85024ace7279b
- https://git.kernel.org/stable/c/24995851d58c4a205ad0ffa7b2f21e479a9c8527
- https://git.kernel.org/stable/c/aad6412c63baa39dd813e81f16a14d976b3de2e8
- https://git.kernel.org/stable/c/ce7356ae35943cc6494cc692e62d51a734062b7d
- https://git.kernel.org/stable/c/ff825ab2f455299c0c7287550915a8878e2a66e0
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



