Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2024-41007— tcp: avoid too many retransmit packets

EPSS 0.02% · P5

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxb701a99e431db784714c32fc6b68123045714679< 7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4affected
b701a99e431db784714c32fc6b68123045714679< d2346fca5bed130dc712f276ac63450201d52969affected
b701a99e431db784714c32fc6b68123045714679< 5d7e64d70a11d988553a08239c810a658e841982affected
b701a99e431db784714c32fc6b68123045714679< 04317a2471c2f637b4c49cbd0e9c0d04a519f570affected
b701a99e431db784714c32fc6b68123045714679< e113cddefa27bbf5a79f72387b8fbd432a61a466affected
b701a99e431db784714c32fc6b68123045714679< dfcdd7f89e401d2c6616be90c76c2fac3fa98fdeaffected
b701a99e431db784714c32fc6b68123045714679< 66cb64a1d2239cd0309f9b5038b05462570a5be1affected
b701a99e431db784714c32fc6b68123045714679< 97a9063518f198ec0adb2ecb89789de342bb8283affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-41007

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
tcp: avoid too many retransmit packets
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT, and the other peer retracted its window to zero, tcp_retransmit_timer() can retransmit a packet every two jiffies (2 ms for HZ=1000), for about 4 minutes after TCP_USER_TIMEOUT has 'expired'. The fix is to make sure tcp_rtx_probe0_timed_out() takes icsk->icsk_user_timeout into account. Before blamed commit, the socket would not timeout after icsk->icsk_user_timeout, but would use standard exponential backoff for the retransmits. Also worth noting that before commit e89688e3e978 ("net: tcp: fix unexcepted socket die when snd_wnd is 0"), the issue would last 2 minutes instead of 4.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于允许多次重新传输数据包。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux b701a99e431db784714c32fc6b68123045714679 ~ 7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4 -
LinuxLinux 4.19 -

II. Public POCs for CVE-2024-41007

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-41007

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-41007

No comments yet


Leave a comment