The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
2010-11-22T13:00:19.300
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.9 (MEDIUM)
AV:L/AC:L/Au:N/C:N/I:N/A:C
3.9
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 2.6.37 | Yes |
Operating System | linux | linux_kernel | 2.6.37 | Yes |
Operating System | linux | linux_kernel | 2.6.37 | Yes |
Operating System | opensuse | opensuse | 11.2 | Yes |
Operating System | opensuse | opensuse | 11.3 | Yes |
Operating System | suse | linux_enterprise_desktop | 11 | Yes |
Operating System | suse | linux_enterprise_real_time_extension | 11 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |