3.3
Advisory Published
CVE Published
Updated

CVE-2024-41007: tcp: avoid too many retransmit packets

First published: Mon Jul 15 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT, and the other peer retracted its window to zero, tcp_retransmit_timer() can retransmit a packet every two jiffies (2 ms for HZ=1000), for about 4 minutes after TCP_USER_TIMEOUT has 'expired'. The fix is to make sure tcp_rtx_probe0_timed_out() takes icsk->icsk_user_timeout into account. Before blamed commit, the socket would not timeout after icsk->icsk_user_timeout, but would use standard exponential backoff for the retransmits. Also worth noting that before commit e89688e3e978 ("net: tcp: fix unexcepted socket die when snd_wnd is 0"), the issue would last 2 minutes instead of 4.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
redhat/kernel<6.10
6.10
Linux Kernel>=4.19<5.4.280
Linux Kernel>=5.5<5.10.222
Linux Kernel>=5.11<5.15.163
Linux Kernel>=5.16<6.1.100
Linux Kernel>=6.2<6.6.41
Linux Kernel>=6.7<6.9.10
IBM Security Verify Governance - Identity Manager<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Software Stack<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Virtual Appliance<=ISVG 10.0.2
IBM Security Verify Governance Identity Manager Container<=ISVG 10.0.2
debian/linux
5.10.223-1
5.10.234-1
6.1.129-1
6.1.135-1
6.12.22-1
6.12.25-1
debian/linux-6.1
6.1.129-1~deb11u1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2024-41007?

    CVE-2024-41007 is a medium severity vulnerability in the Linux kernel.

  • How do I fix CVE-2024-41007?

    To remediate CVE-2024-41007, upgrade the kernel to version 6.10 or the specific patched versions listed for your distribution.

  • Which Linux kernel versions are affected by CVE-2024-41007?

    CVE-2024-41007 affects multiple Linux kernel versions, specifically those between 4.19 and 6.10.

  • What is the impact of CVE-2024-41007?

    The impact of CVE-2024-41007 involves excessive retransmit packets from TCP sockets, potentially leading to network performance issues.

  • Is CVE-2024-41007 related to TCP sockets?

    Yes, CVE-2024-41007 specifically concerns the behavior of TCP sockets using TCP_USER_TIMEOUT.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203