The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel prior to 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.6.37 |
||
linux linux kernel |
||
suse linux enterprise desktop 11 |
||
suse linux enterprise server 11 |
||
opensuse opensuse 11.2 |
||
opensuse opensuse 11.3 |
||
suse linux enterprise real time extension 11 |