Bug 1227780 (CVE-2024-40931)

Summary: VUL-0: CVE-2024-40931: kernel: mptcp: ensure snd_una is properly initialized on connect
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: andrea.mattiazzo, davide.benini, denis.kirjanov, mhocko, miroslav.franc, mkubecek
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/413858/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-40931:5.3:(AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-15 11:14:41 UTC
In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure snd_una is properly initialized on connect

This is strictly related to commit fb7a0d334894 ("mptcp: ensure snd_nxt
is properly initialized on connect"). It turns out that syzkaller can
trigger the retransmit after fallback and before processing any other
incoming packet - so that snd_una is still left uninitialized.

Address the issue explicitly initializing snd_una together with snd_nxt
and write_seq.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40931
https://www.cve.org/CVERecord?id=CVE-2024-40931
https://git.kernel.org/stable/c/208cd22ef5e57f82d38ec11c1a1703f9401d6dde
https://git.kernel.org/stable/c/7b9c7fc8600b64a86e4b47b2d190bba380267726
https://git.kernel.org/stable/c/8031b58c3a9b1db3ef68b3bd749fbee2e1e1aaa3
https://git.kernel.org/stable/c/ef473bf1dd7e8dd08bcc04b9e2d1bfed69a0a7ce
https://git.kernel.org/stable/c/f03c46eabb3a67bd2993e237ab5517f00a5f1813
https://git.kernel.org/stable/c/f1f0a46f8bb8890b90ab7194f0a0c8fe2a3fb57f
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-40931.mbox