CVE-2024-46711:CVE-2024-46711 is a vulnerability in the Linux kernel related to mptcp: pm, specifically addressing the issue of ID 0 endp usage after multiple re-creations.

splash
Back

Description Preview

In the Linux kernel, the vulnerability identified as CVE-2024-46711 has been resolved in the mptcp: pm module. The issue pertains to the handling of ID 0 endp usage after multiple re-creations. Specifically, the decrementing of 'local_addr_used' and 'add_addr_accepted' for addresses not associated with the initial subflow (ID0) is necessary, as the source and destination addresses of the initial subflows are known from the start and should not be counted as additional local addresses being used or ADD_ADDR being accepted. The modification ensures that these counters are not incremented when the entrypoint used by the initial subflow is removed and re-added during a connection, allowing for the removal and re-addition of the entrypoint more than once.

Overview

The vulnerability in the Linux kernel's mptcp: pm module addresses the incorrect handling of ID 0 endp usage after multiple re-creations, impacting certain versions of the kernel.

Remediation

To remediate this vulnerability, affected users are advised to update their Linux kernel to versions that include the fix for the mptcp: pm module. Specifically, users should ensure that their kernel versions are equal to or greater than the fixed versions specified in the CVE details.

References

  1. Advisory Details: https://git.kernel.org/stable/c/c9c744666f7308a4daba520191e29d395260bcfe
  2. Advisory Details: https://git.kernel.org/stable/c/53e2173172d26c0617b29dd83618b71664bed1fb
  3. Advisory Details: https://git.kernel.org/stable/c/119806ae4e46cf239db8e6ad92bc2fd3daae86dc
  4. Advisory Details: https://git.kernel.org/stable/c/9366922adc6a71378ca01f898c41be295309f044

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing
    Manufacturing
  2. Public Administration
    Public Administration
  3. Health Care & Social Assistance
    Health Care & Social Assistance
  4. Finance and Insurance
    Finance and Insurance
  5. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  6. Retail Trade
    Retail Trade
  7. Management of Companies & Enterprises
    Management of Companies & Enterprises
  8. Transportation & Warehousing
    Transportation & Warehousing
  9. Educational Services
    Educational Services
  10. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  11. Other Services (except Public Administration)
    Other Services (except Public Administration)
  12. Information
    Information
  13. Utilities
    Utilities
  14. Accommodation & Food Services
    Accommodation & Food Services
  15. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  16. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  17. Construction
    Construction
  18. Mining
    Mining
  19. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database