CVE-2010-4165
Published: 22 November 2010
The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
From the Ubuntu security team
Steve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service.
Priority
Status
Notes
Author | Note |
---|---|
mdeslaur | introduced by http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f5fff5dc8a7a3f395b0525c02ba92c95d42b7390 |
jdstrand | commit introduced in 2008/09/21. Dapper not affected 2.6.15-57.94. Marking back to 'needed' |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
- https://usn.ubuntu.com/usn/usn-1054-1
- https://usn.ubuntu.com/usn/usn-1073-1
- https://usn.ubuntu.com/usn/usn-1074-1
- https://usn.ubuntu.com/usn/usn-1074-2
- https://usn.ubuntu.com/usn/usn-1083-1
- https://usn.ubuntu.com/usn/usn-1093-1
- https://usn.ubuntu.com/usn/usn-1119-1
- https://usn.ubuntu.com/usn/usn-1167-1
- https://usn.ubuntu.com/usn/usn-1186-1
- NVD
- Launchpad
- Debian