๐Ÿ” CVE Alert

CVE-2024-46711

UNKNOWN 0.0

mptcp: pm: fix ID 0 endp usage after multiple re-creations

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: fix ID 0 endp usage after multiple re-creations 'local_addr_used' and 'add_addr_accepted' are decremented for addresses not related to the initial subflow (ID0), because the source and destination addresses of the initial subflows are known from the beginning: they don't count as "additional local address being used" or "ADD_ADDR being accepted". It is then required not to increment them when the entrypoint used by the initial subflow is removed and re-added during a connection. Without this modification, this entrypoint cannot be removed and re-added more than once.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 13, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3ad14f54bd7448384458e69f0183843f683ecce8 < c9c744666f7308a4daba520191e29d395260bcfe 3ad14f54bd7448384458e69f0183843f683ecce8 < 53e2173172d26c0617b29dd83618b71664bed1fb 3ad14f54bd7448384458e69f0183843f683ecce8 < 119806ae4e46cf239db8e6ad92bc2fd3daae86dc 3ad14f54bd7448384458e69f0183843f683ecce8 < 9366922adc6a71378ca01f898c41be295309f044
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c9c744666f7308a4daba520191e29d395260bcfe git.kernel.org: https://git.kernel.org/stable/c/53e2173172d26c0617b29dd83618b71664bed1fb git.kernel.org: https://git.kernel.org/stable/c/119806ae4e46cf239db8e6ad92bc2fd3daae86dc git.kernel.org: https://git.kernel.org/stable/c/9366922adc6a71378ca01f898c41be295309f044 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html