CVE-2024-45009

Source
https://cve.org/CVERecord?id=CVE-2024-45009
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45009.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-45009
Downstream
Related
Published
2024-09-11T15:13:47.719Z
Modified
2026-03-20T12:38:57.070459Z
Summary
mptcp: pm: only decrement add_addr_accepted for MPJ req
Details

In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: only decrement addaddraccepted for MPJ req

Adding the following warning ...

WARNONONCE(msk->pm.addaddraccepted == 0)

... before decrementing the addaddraccepted counter helped to find a bug when running the "remove single subflow" subtest from the mptcp_join.sh selftest.

Removing a 'subflow' endpoint will first trigger a RMADDR, then the subflow closure. Before this patch, and upon the reception of the RMADDR, the other peer will then try to decrement this addaddraccepted. That's not correct because the attached subflows have not been created upon the reception of an ADD_ADDR.

A way to solve that is to decrement the counter only if the attached subflow was an MPJOIN to a remote id that was not 0, and initiated by the host receiving the RMADDR.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/45xxx/CVE-2024-45009.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d0876b2284cf8b34dd214b2d0aa21071c345da59
Fixed
35b31f5549ede4070566b949781e83495906b43d
Fixed
85b866e4c4e63a1d7afb58f1e24273caad03d0b7
Fixed
d20bf2c96d7ffd171299b32f562f70e5bf5dc608
Fixed
2060f1efab370b496c4903b840844ecaff324c3c
Fixed
1c1f721375989579e46741f59523e39ec9b2a9bd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45009.json"