In the Linux kernel, the following vulnerability has been resolved:
mptcp: use OPTIONMPTCPMPJSYNACK in subflowfinish_connect()
subflowfinishconnect() uses four fields (backup, joinid, thmac, none) that may contain garbage unless OPTIONMPTCPMPJSYNACK has been set in mptcpparseoption()
[
{
"id": "CVE-2024-35840-6da5ec2e",
"target": {
"file": "net/mptcp/subflow.c",
"function": "subflow_finish_connect"
},
"digest": {
"length": 2289.0,
"function_hash": "67588536449962538054129171690446141234"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@76e8de7273a22a00d27e9b8b7d4d043d6433416a",
"signature_version": "v1"
},
{
"id": "CVE-2024-35840-6f94079e",
"target": {
"file": "net/mptcp/subflow.c",
"function": "subflow_finish_connect"
},
"digest": {
"length": 2430.0,
"function_hash": "332491253500662819743140312372834301725"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@51e4cb032d49ce094605f27e45eabebc0408893c",
"signature_version": "v1"
},
{
"id": "CVE-2024-35840-7acb7cf0",
"target": {
"file": "net/mptcp/subflow.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"178466637421630917940237730679920720371",
"298712061803780378987090931575655486139",
"184294950247848446220232793702758320679",
"293376596160774481875941191880703422484"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad3e8f5c3d5c53841046ef7a947c04ad45a20721",
"signature_version": "v1"
},
{
"id": "CVE-2024-35840-b3e54716",
"target": {
"file": "net/mptcp/subflow.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"178466637421630917940237730679920720371",
"298712061803780378987090931575655486139",
"184294950247848446220232793702758320679",
"293376596160774481875941191880703422484"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@76e8de7273a22a00d27e9b8b7d4d043d6433416a",
"signature_version": "v1"
},
{
"id": "CVE-2024-35840-d0896847",
"target": {
"file": "net/mptcp/subflow.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"324768330165162765138348549564193346104",
"298712061803780378987090931575655486139",
"184294950247848446220232793702758320679",
"293376596160774481875941191880703422484"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@51e4cb032d49ce094605f27e45eabebc0408893c",
"signature_version": "v1"
},
{
"id": "CVE-2024-35840-f6ab64d9",
"target": {
"file": "net/mptcp/subflow.c",
"function": "subflow_finish_connect"
},
"digest": {
"length": 2289.0,
"function_hash": "67588536449962538054129171690446141234"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad3e8f5c3d5c53841046ef7a947c04ad45a20721",
"signature_version": "v1"
}
]