CVE-2025-21710 (GCVE-0-2025-21710)
Vulnerability from cvelistv5
Published
2025-02-27 02:07
Modified
2025-05-04 07:19
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: tcp: correct handling of extreme memory squeeze Testing with iperf3 using the "pasta" protocol splicer has revealed a problem in the way tcp handles window advertising in extreme memory squeeze situations. Under memory pressure, a socket endpoint may temporarily advertise a zero-sized window, but this is not stored as part of the socket data. The reasoning behind this is that it is considered a temporary setting which shouldn't influence any further calculations. However, if we happen to stall at an unfortunate value of the current window size, the algorithm selecting a new value will consistently fail to advertise a non-zero window once we have freed up enough memory. This means that this side's notion of the current window size is different from the one last advertised to the peer, causing the latter to not send any data to resolve the sitution. The problem occurs on the iperf3 server side, and the socket in question is a completely regular socket with the default settings for the fedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket. The following excerpt of a logging session, with own comments added, shows more in detail what is happening: // tcp_v4_rcv(->) // tcp_rcv_established(->) [5201<->39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ==== [5201<->39222]: tcp_data_queue(->) [5201<->39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184] [copied_seq 259909392->260034360 (124968), unread 5565800, qlen 85, ofoq 0] [OFO queue: gap: 65480, len: 0] [5201<->39222]: tcp_data_queue(<-) [5201<->39222]: __tcp_transmit_skb(->) [tp->rcv_wup: 265469200, tp->rcv_wnd: 262144, tp->rcv_nxt 265600160] [5201<->39222]: tcp_select_window(->) [5201<->39222]: (inet_csk(sk)->icsk_ack.pending & ICSK_ACK_NOMEM) ? --> TRUE [tp->rcv_wup: 265469200, tp->rcv_wnd: 262144, tp->rcv_nxt 265600160] returning 0 [5201<->39222]: tcp_select_window(<-) [5201<->39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160 [5201<->39222]: [__tcp_transmit_skb(<-) [5201<->39222]: tcp_rcv_established(<-) [5201<->39222]: tcp_v4_rcv(<-) // Receive queue is at 85 buffers and we are out of memory. // We drop the incoming buffer, although it is in sequence, and decide // to send an advertisement with a window of zero. // We don't update tp->rcv_wnd and tp->rcv_wup accordingly, which means // we unconditionally shrink the window. [5201<->39222]: tcp_recvmsg_locked(->) [5201<->39222]: __tcp_cleanup_rbuf(->) tp->rcv_wup: 265469200, tp->rcv_wnd: 262144, tp->rcv_nxt 265600160 [5201<->39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368] [5201<->39222]: [new_win >= (2 * win_now) ? --> time_to_ack = 0] [5201<->39222]: NOT calling tcp_send_ack() [tp->rcv_wup: 265469200, tp->rcv_wnd: 262144, tp->rcv_nxt 265600160] [5201<->39222]: __tcp_cleanup_rbuf(<-) [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184] [copied_seq 260040464->260040464 (0), unread 5559696, qlen 85, ofoq 0] returning 6104 bytes [5201<->39222]: tcp_recvmsg_locked(<-) // After each read, the algorithm for calculating the new receive // window in __tcp_cleanup_rbuf() finds it is too small to advertise // or to update tp->rcv_wnd. // Meanwhile, the peer thinks the window is zero, and will not send // any more data to trigger an update from the interrupt mode side. [5201<->39222]: tcp_recvmsg_locked(->) [5201<->39222]: __tcp_cleanup_rbuf(->) tp->rcv_wup: 265469200, tp->rcv_wnd: 262144, tp->rcv_nxt 265600160 [5201<->39222]: [new_win = 262144, win_now = 131184, 2 * win_n ---truncated---
Impacted products
Vendor Product Version
Linux Linux Version: e2142825c120d4317abf7160a0fc34b3de532586
Version: e2142825c120d4317abf7160a0fc34b3de532586
Version: e2142825c120d4317abf7160a0fc34b3de532586
Version: e2142825c120d4317abf7160a0fc34b3de532586
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/ipv4/tcp_output.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b01e7ceb35dcb7ffad413da657b78c3340a09039",
              "status": "affected",
              "version": "e2142825c120d4317abf7160a0fc34b3de532586",
              "versionType": "git"
            },
            {
              "lessThan": "1dd823a46e25ffde1492c391934f69a9e5eb574f",
              "status": "affected",
              "version": "e2142825c120d4317abf7160a0fc34b3de532586",
              "versionType": "git"
            },
            {
              "lessThan": "b4055e2fe96f4ef101d8af0feb056d78d77514ff",
              "status": "affected",
              "version": "e2142825c120d4317abf7160a0fc34b3de532586",
              "versionType": "git"
            },
            {
              "lessThan": "8c670bdfa58e48abad1d5b6ca1ee843ca91f7303",
              "status": "affected",
              "version": "e2142825c120d4317abf7160a0fc34b3de532586",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/ipv4/tcp_output.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.6"
            },
            {
              "lessThan": "6.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.76",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.14",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.76",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.13",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.2",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n//              tcp_v4_rcv(-\u003e)\n//                tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]:     ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]:     tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]:        DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n                       [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n                       [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n                       [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]:     tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]:     __tcp_transmit_skb(-\u003e)\n                        [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]:       tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]:         (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n                        [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n                        returning 0\n[5201\u003c-\u003e39222]:       tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]:       ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]:     [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]:   tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]:   __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]:     [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]:     [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]:     NOT calling tcp_send_ack()\n                    [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]:   __tcp_cleanup_rbuf(\u003c-)\n                  [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n                  [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n                  returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]:   __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]:     [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:19:28.250Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b01e7ceb35dcb7ffad413da657b78c3340a09039"
        },
        {
          "url": "https://git.kernel.org/stable/c/1dd823a46e25ffde1492c391934f69a9e5eb574f"
        },
        {
          "url": "https://git.kernel.org/stable/c/b4055e2fe96f4ef101d8af0feb056d78d77514ff"
        },
        {
          "url": "https://git.kernel.org/stable/c/8c670bdfa58e48abad1d5b6ca1ee843ca91f7303"
        }
      ],
      "title": "tcp: correct handling of extreme memory squeeze",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-21710",
    "datePublished": "2025-02-27T02:07:23.112Z",
    "dateReserved": "2024-12-29T08:45:45.752Z",
    "dateUpdated": "2025-05-04T07:19:28.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-21710\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-27T02:15:14.657\",\"lastModified\":\"2025-02-27T02:15:14.657\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntcp: correct handling of extreme memory squeeze\\n\\nTesting with iperf3 using the \\\"pasta\\\" protocol splicer has revealed\\na problem in the way tcp handles window advertising in extreme memory\\nsqueeze situations.\\n\\nUnder memory pressure, a socket endpoint may temporarily advertise\\na zero-sized window, but this is not stored as part of the socket data.\\nThe reasoning behind this is that it is considered a temporary setting\\nwhich shouldn\u0027t influence any further calculations.\\n\\nHowever, if we happen to stall at an unfortunate value of the current\\nwindow size, the algorithm selecting a new value will consistently fail\\nto advertise a non-zero window once we have freed up enough memory.\\nThis means that this side\u0027s notion of the current window size is\\ndifferent from the one last advertised to the peer, causing the latter\\nto not send any data to resolve the sitution.\\n\\nThe problem occurs on the iperf3 server side, and the socket in question\\nis a completely regular socket with the default settings for the\\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\\n\\nThe following excerpt of a logging session, with own comments added,\\nshows more in detail what is happening:\\n\\n//              tcp_v4_rcv(-\u003e)\\n//                tcp_rcv_established(-\u003e)\\n[5201\u003c-\u003e39222]:     ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\\n[5201\u003c-\u003e39222]:     tcp_data_queue(-\u003e)\\n[5201\u003c-\u003e39222]:        DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\\n                       [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\\n                       [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\\n                       [OFO queue: gap: 65480, len: 0]\\n[5201\u003c-\u003e39222]:     tcp_data_queue(\u003c-)\\n[5201\u003c-\u003e39222]:     __tcp_transmit_skb(-\u003e)\\n                        [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\\n[5201\u003c-\u003e39222]:       tcp_select_window(-\u003e)\\n[5201\u003c-\u003e39222]:         (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\\n                        [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\\n                        returning 0\\n[5201\u003c-\u003e39222]:       tcp_select_window(\u003c-)\\n[5201\u003c-\u003e39222]:       ADVERTISING WIN 0, ACK_SEQ: 265600160\\n[5201\u003c-\u003e39222]:     [__tcp_transmit_skb(\u003c-)\\n[5201\u003c-\u003e39222]:   tcp_rcv_established(\u003c-)\\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\\n\\n// Receive queue is at 85 buffers and we are out of memory.\\n// We drop the incoming buffer, although it is in sequence, and decide\\n// to send an advertisement with a window of zero.\\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\\n// we unconditionally shrink the window.\\n\\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\\n[5201\u003c-\u003e39222]:   __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\\n[5201\u003c-\u003e39222]:     [new_win = 0, win_now = 131184, 2 * win_now = 262368]\\n[5201\u003c-\u003e39222]:     [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\\n[5201\u003c-\u003e39222]:     NOT calling tcp_send_ack()\\n                    [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\\n[5201\u003c-\u003e39222]:   __tcp_cleanup_rbuf(\u003c-)\\n                  [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\\n                  [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\\n                  returning 6104 bytes\\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\\n\\n// After each read, the algorithm for calculating the new receive\\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\\n// or to update tp-\u003ercv_wnd.\\n// Meanwhile, the peer thinks the window is zero, and will not send\\n// any more data to trigger an update from the interrupt mode side.\\n\\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\\n[5201\u003c-\u003e39222]:   __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\\n[5201\u003c-\u003e39222]:     [new_win = 262144, win_now = 131184, 2 * win_n\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: gesti\u00f3n correcta de la compresi\u00f3n extrema de memoria Las pruebas con iperf3 utilizando el empalmador de protocolo \\\"pasta\\\" han revelado un problema en la forma en que tcp gestiona la publicidad de ventanas en situaciones de compresi\u00f3n extrema de memoria. Bajo presi\u00f3n de memoria, un endpoint de socket puede anunciar temporalmente una ventana de tama\u00f1o cero, pero esto no se almacena como parte de los datos del socket. El razonamiento detr\u00e1s de esto es que se considera una configuraci\u00f3n temporal que no deber\u00eda influir en ning\u00fan c\u00e1lculo posterior. Sin embargo, si nos quedamos en un valor desafortunado del tama\u00f1o de ventana actual, el algoritmo que selecciona un nuevo valor fallar\u00e1 constantemente en anunciar una ventana distinta de cero una vez que hayamos liberado suficiente memoria. Esto significa que la noci\u00f3n de este lado del tama\u00f1o de ventana actual es diferente de la \u00faltima anunciada al par, lo que hace que este \u00faltimo no env\u00ede ning\u00fan dato para resolver la situaci\u00f3n. El problema ocurre en el lado del servidor iperf3, y el socket en cuesti\u00f3n es un socket completamente normal con la configuraci\u00f3n predeterminada para el kernel fedora40. No utilizamos SO_PEEK o SO_RCVBUF en el socket. El siguiente extracto de una sesi\u00f3n de registro, con comentarios propios agregados, muestra con m\u00e1s detalle lo que est\u00e1 sucediendo: // tcp_v4_rcv(-\u0026gt;) // tcp_rcv_established(-\u0026gt;) [5201\u0026lt;-\u0026gt;39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ==== [5201\u0026lt;-\u0026gt;39222]: tcp_data_queue(-\u0026gt;) [5201\u0026lt;-\u0026gt;39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184] [copied_seq 259909392-\u0026gt;260034360 (124968), unread 5565800, qlen 85, ofoq 0] [OFO queue: gap: 65480, len: 0] [5201\u0026lt;-\u0026gt;39222]: tcp_data_queue(\u0026lt;-) [5201\u0026lt;-\u0026gt;39222]: __tcp_transmit_skb(-\u0026gt;) [tp-\u0026gt;rcv_wup: 265469200, tp-\u0026gt;rcv_wnd: 262144, tp-\u0026gt;rcv_nxt 265600160] [5201\u0026lt;-\u0026gt;39222]: tcp_select_window(-\u0026gt;) [5201\u0026lt;-\u0026gt;39222]: (inet_csk(sk)-\u0026gt;icsk_ack.pending \u0026amp; ICSK_ACK_NOMEM) ? --\u0026gt; TRUE [tp-\u0026gt;rcv_wup: 265469200, tp-\u0026gt;rcv_wnd: 262144, tp-\u0026gt;rcv_nxt 265600160] returning 0 [5201\u0026lt;-\u0026gt;39222]: tcp_select_window(\u0026lt;-) [5201\u0026lt;-\u0026gt;39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160 [5201\u0026lt;-\u0026gt;39222]: [__tcp_transmit_skb(\u0026lt;-) [5201\u0026lt;-\u0026gt;39222]: tcp_rcv_established(\u0026lt;-) [5201\u0026lt;-\u0026gt;39222]: tcp_v4_rcv(\u0026lt;-) // La cola de recepci\u00f3n est\u00e1 en 85 b\u00faferes y nos hemos quedado sin memoria. // Descartamos el b\u00fafer entrante, aunque est\u00e9 en secuencia, y decidimos // enviar un anuncio con una ventana de cero. // No actualizamos tp-\u0026gt;rcv_wnd y tp-\u0026gt;rcv_wup en consecuencia, lo que significa // que reducimos incondicionalmente la ventana. [5201\u0026lt;-\u0026gt;39222]: tcp_recvmsg_locked(-\u0026gt;) [5201\u0026lt;-\u0026gt;39222]: __tcp_cleanup_rbuf(-\u0026gt;) tp-\u0026gt;rcv_wup: 265469200, tp-\u0026gt;rcv_wnd: 262144, tp-\u0026gt;rcv_nxt 265600160 [5201\u0026lt;-\u0026gt;39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368] [5201\u0026lt;-\u0026gt;39222]: [new_win \u0026gt;= (2 * win_now) ? --\u0026gt; time_to_ack = 0] [5201\u0026lt;-\u0026gt;39222]: NOT calling tcp_send_ack() [tp-\u0026gt;rcv_wup: 265469200, tp-\u0026gt;rcv_wnd: 262144, tp-\u0026gt;rcv_nxt 265600160] [5201\u0026lt;-\u0026gt;39222]: __tcp_cleanup_rbuf(\u0026lt;-) [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184] [copied_seq 260040464-\u0026gt;260040464 (0), unread 5559696, qlen 85, ofoq 0] returning 6104 bytes [5201\u0026lt;-\u0026gt;39222]: tcp_recvmsg_locked(\u0026lt;-) // Despu\u00e9s de cada lectura, el algoritmo para calcular la nueva ventana de recepci\u00f3n // en __tcp_cleanup_rbuf() encuentra que es demasiado peque\u00f1a para anunciar // o actualizar tp-\u0026gt;rcv_wnd. // Mientras tanto, el par piensa que la ventana es cero y no enviar\u00e1 // m\u00e1s datos para activar una actualizaci\u00f3n desde el lado del modo de interrupci\u00f3n. [5201\u0026lt;-\u0026gt;39222]: tcp_recvmsg_locked(-\u0026gt;) [5201\u0026lt;-\u0026gt;39222]: __tcp_cleanup_rbuf(-\u0026gt;) tp-\u0026gt;rcv_wup: 265469200, tp-\u0026gt;rcv_wnd: 262144, tp-\u0026gt;rcv_nxt 265600160 [5201\u0026lt;-\u0026gt;39222]: [new\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1dd823a46e25ffde1492c391934f69a9e5eb574f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8c670bdfa58e48abad1d5b6ca1ee843ca91f7303\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b01e7ceb35dcb7ffad413da657b78c3340a09039\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b4055e2fe96f4ef101d8af0feb056d78d77514ff\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…