In the Linux kernel, the following vulnerability has been resolved:
mptcp: cope racing subflow creation in mptcprcvspace_adjust
Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs.
A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcpcleanuprbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones.
Explicitly check that the subflow is in a suitable state before invoking tcpcleanuprbuf().
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183730922472534834604668238529723400675",
"293126823559624553373918494631697994018",
"188447452270259484668322679375790461699",
"288355340238246528230705958948185212344"
]
},
"id": "CVE-2024-53122-07f068af",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aad6412c63baa39dd813e81f16a14d976b3de2e8",
"target": {
"file": "net/mptcp/protocol.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1994.0,
"function_hash": "323484249561054705328810009391948489409"
},
"id": "CVE-2024-53122-1c139f6e",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aad6412c63baa39dd813e81f16a14d976b3de2e8",
"target": {
"file": "net/mptcp/protocol.c",
"function": "mptcp_rcv_space_adjust"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"106561316225548628757887826169927011170",
"328243555987430649406549687574975215651",
"178989368291173883845105439170645710911",
"288355340238246528230705958948185212344"
]
},
"id": "CVE-2024-53122-2fce4a98",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a9a182ea5c7bb0374e527130fd85024ace7279b",
"target": {
"file": "net/mptcp/protocol.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1994.0,
"function_hash": "323484249561054705328810009391948489409"
},
"id": "CVE-2024-53122-51c50d4f",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce7356ae35943cc6494cc692e62d51a734062b7d",
"target": {
"file": "net/mptcp/protocol.c",
"function": "mptcp_rcv_space_adjust"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183730922472534834604668238529723400675",
"293126823559624553373918494631697994018",
"188447452270259484668322679375790461699",
"288355340238246528230705958948185212344"
]
},
"id": "CVE-2024-53122-b7ee83ce",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce7356ae35943cc6494cc692e62d51a734062b7d",
"target": {
"file": "net/mptcp/protocol.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183730922472534834604668238529723400675",
"293126823559624553373918494631697994018",
"188447452270259484668322679375790461699",
"288355340238246528230705958948185212344"
]
},
"id": "CVE-2024-53122-b9023c81",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ff825ab2f455299c0c7287550915a8878e2a66e0",
"target": {
"file": "net/mptcp/protocol.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1941.0,
"function_hash": "242559517413440026306085491215859864242"
},
"id": "CVE-2024-53122-c5aaa625",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a9a182ea5c7bb0374e527130fd85024ace7279b",
"target": {
"file": "net/mptcp/protocol.c",
"function": "mptcp_rcv_space_adjust"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1994.0,
"function_hash": "323484249561054705328810009391948489409"
},
"id": "CVE-2024-53122-e2129f46",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ff825ab2f455299c0c7287550915a8878e2a66e0",
"target": {
"file": "net/mptcp/protocol.c",
"function": "mptcp_rcv_space_adjust"
}
}
]