CVE-2024-46711 Affecting kernel-core package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL9-KERNELCORE-7987038
- published 17 Sep 2024
- disclosed 13 Sep 2024
Introduced: 13 Sep 2024
CVE-2024-46711 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:9
kernel-core
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-core
package and not the kernel-core
package as distributed by RHEL
.
See How to fix?
for RHEL:9
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
mptcp: pm: fix ID 0 endp usage after multiple re-creations
'local_addr_used' and 'add_addr_accepted' are decremented for addresses not related to the initial subflow (ID0), because the source and destination addresses of the initial subflows are known from the beginning: they don't count as "additional local address being used" or "ADD_ADDR being accepted".
It is then required not to increment them when the entrypoint used by the initial subflow is removed and re-added during a connection. Without this modification, this entrypoint cannot be removed and re-added more than once.
References
- https://access.redhat.com/security/cve/CVE-2024-46711
- https://git.kernel.org/stable/c/119806ae4e46cf239db8e6ad92bc2fd3daae86dc
- https://git.kernel.org/stable/c/53e2173172d26c0617b29dd83618b71664bed1fb
- https://git.kernel.org/stable/c/9366922adc6a71378ca01f898c41be295309f044
- https://git.kernel.org/stable/c/c9c744666f7308a4daba520191e29d395260bcfe