Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-26826
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-17 Apr, 2024 | 09:43
Updated At-04 May, 2025 | 08:57
Rejected At-
▼CVE Numbering Authority (CNA)
mptcp: fix data re-injection from stale subflow

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data re-injection from stale subflow When the MPTCP PM detects that a subflow is stale, all the packet scheduler must re-inject all the mptcp-level unacked data. To avoid acquiring unneeded locks, it first try to check if any unacked data is present at all in the RTX queue, but such check is currently broken, as it uses TCP-specific helper on an MPTCP socket. Funnily enough fuzzers and static checkers are happy, as the accessed memory still belongs to the mptcp_sock struct, and even from a functional perspective the recovery completed successfully, as the short-cut test always failed. A recent unrelated TCP change - commit d5fed5addb2b ("tcp: reorganize tcp_sock fast path variables") - exposed the issue, as the tcp field reorganization makes the mptcp code always skip the re-inection. Fix the issue dropping the bogus call: we are on a slow path, the early optimization proved once again to be evil.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/mptcp/protocol.c
Default Status
unaffected
Versions
Affected
  • From 1e1d9d6f119c55c05e8ea78ed3e49046690abffd before 6f95120f898b40d13fd441225ef511307853c9c2 (git)
  • From 1e1d9d6f119c55c05e8ea78ed3e49046690abffd before 6673d9f1c2cd984390550dbdf7d5ae07b20abbf8 (git)
  • From 1e1d9d6f119c55c05e8ea78ed3e49046690abffd before b609c783c535493aa3fca22c7e40a120370b1ca5 (git)
  • From 1e1d9d6f119c55c05e8ea78ed3e49046690abffd before 624902eab7abcb8731b333ec73f206d38d839cd8 (git)
  • From 1e1d9d6f119c55c05e8ea78ed3e49046690abffd before b6c620dc43ccb4e802894e54b651cf81495e9598 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/mptcp/protocol.c
Default Status
affected
Versions
Affected
  • 5.15
Unaffected
  • From 0 before 5.15 (semver)
  • From 5.15.149 through 5.15.* (semver)
  • From 6.1.79 through 6.1.* (semver)
  • From 6.6.18 through 6.6.* (semver)
  • From 6.7.6 through 6.7.* (semver)
  • From 6.8 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/6f95120f898b40d13fd441225ef511307853c9c2
N/A
https://git.kernel.org/stable/c/6673d9f1c2cd984390550dbdf7d5ae07b20abbf8
N/A
https://git.kernel.org/stable/c/b609c783c535493aa3fca22c7e40a120370b1ca5
N/A
https://git.kernel.org/stable/c/624902eab7abcb8731b333ec73f206d38d839cd8
N/A
https://git.kernel.org/stable/c/b6c620dc43ccb4e802894e54b651cf81495e9598
N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/6f95120f898b40d13fd441225ef511307853c9c2
x_transferred
https://git.kernel.org/stable/c/6673d9f1c2cd984390550dbdf7d5ae07b20abbf8
x_transferred
https://git.kernel.org/stable/c/b609c783c535493aa3fca22c7e40a120370b1ca5
x_transferred
https://git.kernel.org/stable/c/624902eab7abcb8731b333ec73f206d38d839cd8
x_transferred
https://git.kernel.org/stable/c/b6c620dc43ccb4e802894e54b651cf81495e9598
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found