CVE-2024-45010
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mptcp: pm: only mark &#39;subflow&#39; endp as available<br />
<br />
Adding the following warning ...<br />
<br />
WARN_ON_ONCE(msk->pm.local_addr_used == 0)<br />
<br />
... before decrementing the local_addr_used counter helped to find a bug<br />
when running the "remove single address" subtest from the mptcp_join.sh<br />
selftests.<br />
<br />
Removing a &#39;signal&#39; endpoint will trigger the removal of all subflows<br />
linked to this endpoint via mptcp_pm_nl_rm_addr_or_subflow() with<br />
rm_type == MPTCP_MIB_RMSUBFLOW. This will decrement the local_addr_used<br />
counter, which is wrong in this case because this counter is linked to<br />
&#39;subflow&#39; endpoints, and here it is a &#39;signal&#39; endpoint that is being<br />
removed.<br />
<br />
Now, the counter is decremented, only if the ID is being used outside<br />
of mptcp_pm_nl_rm_addr_or_subflow(), only for &#39;subflow&#39; endpoints, and<br />
if the ID is not 0 -- local_addr_used is not taking into account these<br />
ones. This marking of the ID as being available, and the decrement is<br />
done no matter if a subflow using this ID is currently available,<br />
because the subflow could have been closed before.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 6.1.108 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.48 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/322ea3778965da72862cca2a0c50253aacf65fe6
- https://git.kernel.org/stable/c/43cf912b0b0fc7b4fd12cbc735d1f5afb8e1322d
- https://git.kernel.org/stable/c/7fdc870d08960961408a44c569f20f50940e7d4f
- https://git.kernel.org/stable/c/9849cfc67383ceb167155186f8f8fe8a896b60b3
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



