CVE-2024-45009

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mptcp: pm: only decrement add_addr_accepted for MPJ req<br /> <br /> Adding the following warning ...<br /> <br /> WARN_ON_ONCE(msk-&gt;pm.add_addr_accepted == 0)<br /> <br /> ... before decrementing the add_addr_accepted counter helped to find a<br /> bug when running the "remove single subflow" subtest from the<br /> mptcp_join.sh selftest.<br /> <br /> Removing a &amp;#39;subflow&amp;#39; endpoint will first trigger a RM_ADDR, then the<br /> subflow closure. Before this patch, and upon the reception of the<br /> RM_ADDR, the other peer will then try to decrement this<br /> add_addr_accepted. That&amp;#39;s not correct because the attached subflows have<br /> not been created upon the reception of an ADD_ADDR.<br /> <br /> A way to solve that is to decrement the counter only if the attached<br /> subflow was an MP_JOIN to a remote id that was not 0, and initiated by<br /> the host receiving the RM_ADDR.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10 (including) 5.15.167 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.107 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.48 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*