In the Linux kernel, the following vulnerability has been resolved:
mptcp: pm: fix ID 0 endp usage after multiple re-creations
'localaddrused' and 'addaddraccepted' are decremented for addresses not related to the initial subflow (ID0), because the source and destination addresses of the initial subflows are known from the beginning: they don't count as "additional local address being used" or "ADD_ADDR being accepted".
It is then required not to increment them when the entrypoint used by the initial subflow is removed and re-added during a connection. Without this modification, this entrypoint cannot be removed and re-added more than once.
{ "vanir_signatures": [ { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9366922adc6a71378ca01f898c41be295309f044", "signature_type": "Line", "target": { "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "line_hashes": [ "213388227840127487424712013799768188803", "4113378300411285993132802283825082272", "308472595338749201567431801972856472342", "46585121800183527332150977091469299026", "338727509532258417309737996776991468492", "324094878559211724111451582318612323455", "37643427860557853648539773958171577093", "49005736468585574899533973868774118280", "98922763298623253789556149791855774177", "73367918493264246178724740241128712968", "70502177259625576186448692960279546671" ], "threshold": 0.9 }, "id": "CVE-2024-46711-16bfb44e" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@119806ae4e46cf239db8e6ad92bc2fd3daae86dc", "signature_type": "Line", "target": { "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "line_hashes": [ "213388227840127487424712013799768188803", "4113378300411285993132802283825082272", "308472595338749201567431801972856472342", "46585121800183527332150977091469299026", "338727509532258417309737996776991468492", "324094878559211724111451582318612323455", "37643427860557853648539773958171577093", "49005736468585574899533973868774118280", "98922763298623253789556149791855774177", "73367918493264246178724740241128712968", "70502177259625576186448692960279546671" ], "threshold": 0.9 }, "id": "CVE-2024-46711-199c8bef" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@119806ae4e46cf239db8e6ad92bc2fd3daae86dc", "signature_type": "Function", "target": { "function": "mptcp_pm_nl_add_addr_received", "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "length": 990.0, "function_hash": "125721477428973794242024034765387809282" }, "id": "CVE-2024-46711-aa4807b5" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9366922adc6a71378ca01f898c41be295309f044", "signature_type": "Function", "target": { "function": "mptcp_pm_nl_add_addr_received", "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "length": 990.0, "function_hash": "125721477428973794242024034765387809282" }, "id": "CVE-2024-46711-acde2009" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c9c744666f7308a4daba520191e29d395260bcfe", "signature_type": "Function", "target": { "function": "mptcp_pm_nl_add_addr_received", "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "length": 955.0, "function_hash": "179300004198038378089631952149422502652" }, "id": "CVE-2024-46711-b6bca314" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@119806ae4e46cf239db8e6ad92bc2fd3daae86dc", "signature_type": "Function", "target": { "function": "mptcp_pm_create_subflow_or_signal_addr", "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "length": 2350.0, "function_hash": "326193169323656430705034368619089409325" }, "id": "CVE-2024-46711-b9b111cd" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c9c744666f7308a4daba520191e29d395260bcfe", "signature_type": "Function", "target": { "function": "mptcp_pm_create_subflow_or_signal_addr", "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "length": 2358.0, "function_hash": "94629071423486672857858446915722128077" }, "id": "CVE-2024-46711-d71cfc60" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c9c744666f7308a4daba520191e29d395260bcfe", "signature_type": "Line", "target": { "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "line_hashes": [ "213388227840127487424712013799768188803", "4113378300411285993132802283825082272", "308472595338749201567431801972856472342", "46585121800183527332150977091469299026", "338727509532258417309737996776991468492", "324094878559211724111451582318612323455", "37643427860557853648539773958171577093", "49005736468585574899533973868774118280", "98922763298623253789556149791855774177", "73367918493264246178724740241128712968", "70502177259625576186448692960279546671" ], "threshold": 0.9 }, "id": "CVE-2024-46711-d98408a5" }, { "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9366922adc6a71378ca01f898c41be295309f044", "signature_type": "Function", "target": { "function": "mptcp_pm_create_subflow_or_signal_addr", "file": "net/mptcp/pm_netlink.c" }, "deprecated": false, "digest": { "length": 2350.0, "function_hash": "326193169323656430705034368619089409325" }, "id": "CVE-2024-46711-f3b6f44f" } ] }