The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:34:37.237Z
Reserved: 2010-11-04T00:00:00
Link: CVE-2010-4165

No data.

Status : Modified
Published: 2010-11-22T13:00:19.300
Modified: 2024-11-21T01:20:21.327
Link: CVE-2010-4165
