• CVE-2024-41007

发布时间: 2024年7月25日

修改时间: 2024年7月26日

概要

In the Linux kernel, the following vulnerability has been resolved: tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT, and the other peer retracted its window to zero, tcp_retransmit_timer() can retransmit a packet every two jiffies (2 ms for HZ=1000), for about 4 minutes after TCP_USER_TIMEOUT has 'expired'. The fix is to make sure tcp_rtx_probe0_timed_out() takes icsk->icsk_user_timeout into account. Before blamed commit, the socket would not timeout after icsk->icsk_user_timeout, but would use standard exponential backoff for the retransmits. Also worth noting that before commit e89688e3e978 ("net: tcp: fix unexcepted socket die when snd_wnd is 0"), the issue would last 2 minutes instead of 4.

CVSS v3 指标

NVD openEuler
CVSS评分 3.3 3.3
Attack Vector Local Local
Attack Complexity Low Low
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality None None
Integrity None None
Availability Low Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3228 kernel security update 2024年7月26日
KylinSec-SA-2024-3668 kernel security update 2024年7月26日

影响产品

产品 状态
KY3.4-5A kernel Fixed
KY3.5.2 kernel Fixed
KY3.5.2 kernel Unaffected
V6 kernel Fixed