Wind River Support Network

HomeDefectsLIN1023-7142
Fixed

LIN1023-7142 : Security Advisory - linux - CVE-2024-41007

Created: Jul 15, 2024    Updated: Aug 6, 2024
Resolved Date: Aug 5, 2024
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:

tcp: avoid too many retransmit packets

If a TCP socket is using TCP_USER_TIMEOUT, and the other peer
retracted its window to zero, tcp_retransmit_timer() can
retransmit a packet every two jiffies (2 ms for HZ=1000),
for about 4 minutes after TCP_USER_TIMEOUT has 'expired'.

The fix is to make sure tcp_rtx_probe0_timed_out() takes
icsk->icsk_user_timeout into account.

Before blamed commit, the socket would not timeout after
icsk->icsk_user_timeout, but would use standard exponential
backoff for the retransmits.

Also worth noting that before commit e89688e3e978 ("net: tcp:
fix unexcepted socket die when snd_wnd is 0"), the issue
would last 2 minutes instead of 4.

CREATE(Triage):(User=admin) CVE-2024-41007 (https://nvd.nist.gov/vuln/detail/CVE-2024-41007)

CVEs


Live chat
Online