CVE-2024-41007

In the Linux kernel, the following vulnerability has been resolved: tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT, and the other peer retracted its window to zero, tcp_retransmit_timer() can retransmit a packet every two jiffies (2 ms for HZ=1000), for about 4 minutes after TCP_USER_TIMEOUT has 'expired'. The fix is to make sure tcp_rtx_probe0_timed_out() takes icsk->icsk_user_timeout into account. Before blamed commit, the socket would not timeout after icsk->icsk_user_timeout, but would use standard exponential backoff for the retransmits. Also worth noting that before commit e89688e3e978 ("net: tcp: fix unexcepted socket die when snd_wnd is 0"), the issue would last 2 minutes instead of 4.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Jul 2024, 18:24

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570 - () https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570 - Patch
References () https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982 - () https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982 - Patch
References () https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b05462570a5be1 - () https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b05462570a5be1 - Patch
References () https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4 - () https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4 - Patch
References () https://git.kernel.org/stable/c/97a9063518f198ec0adb2ecb89789de342bb8283 - () https://git.kernel.org/stable/c/97a9063518f198ec0adb2ecb89789de342bb8283 - Patch
References () https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969 - () https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969 - Patch
References () https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde - () https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde - Patch
References () https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466 - () https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466 - Patch
CWE NVD-CWE-noinfo

18 Jul 2024, 12:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570 -
  • () https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982 -
  • () https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b05462570a5be1 -
  • () https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4 -
  • () https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969 -
  • () https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde -
  • () https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: evitar demasiados paquetes de retransmisión Si un socket TCP está usando TCP_USER_TIMEOUT y el otro par retrajo su ventana a cero, tcp_retransmit_timer() puede retransmitir un paquete cada dos santiamén (2 ms). para HZ=1000), durante aproximadamente 4 minutos después de que TCP_USER_TIMEOUT haya 'expirado'. La solución es asegurarse de que tcp_rtx_probe0_timed_out() tenga en cuenta icsk->icsk_user_timeout. Antes de el commit culpable, el socket no expiraba después de icsk->icsk_user_timeout, sino que usaba un retroceso exponencial estándar para las retransmisiones. También vale la pena señalar que antes de commit e89688e3e978 ("net: tcp: fix unexcepted socket die cuando snd_wnd es 0"), el problema duraría 2 minutos en lugar de 4.

15 Jul 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-15 09:15

Updated : 2024-07-19 18:24


NVD link : CVE-2024-41007

Mitre link : CVE-2024-41007

CVE.ORG link : CVE-2024-41007


JSON object : View

Products Affected

linux

  • linux_kernel