CVE-2010-4165
Publication date 22 November 2010
Last updated 24 July 2024
Ubuntu priority
The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
From the Ubuntu Security Team
Steve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Notes
Patch details
References
Related Ubuntu Security Notices (USN)
- USN-1073-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1186-1
- Linux kernel vulnerabilities
- 9 August 2011
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1054-1
- Linux kernel vulnerabilities
- 1 February 2011
- USN-1119-1
- Linux kernel (OMAP4) vulnerabilities
- 20 April 2011
- USN-1074-2
- Linux kernel vulnerabilities
- 28 February 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011