Unrated severityNVD Advisory· Published Nov 22, 2010· Updated Apr 29, 2026
CVE-2010-4165
CVE-2010-4165
Description
The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
Affected products
8- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
22- www.openwall.com/lists/oss-security/2010/11/12/1nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2010/11/12/4nvdMailing ListPatchThird Party Advisory
- www.spinics.net/lists/netdev/msg146405.htmlnvdMailing ListPatchThird Party Advisory
- www.spinics.net/lists/netdev/msg146495.htmlnvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- securityreason.com/securityalert/8111nvdExploitThird Party Advisory
- securityreason.com/securityalert/8123nvdExploitThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlnvdMailing ListThird Party Advisory
- secunia.com/advisories/42778nvdThird Party Advisory
- secunia.com/advisories/42801nvdThird Party Advisory
- secunia.com/advisories/42932nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.securityfocus.com/bid/44830nvdThird Party AdvisoryVDB Entry
- www.vupen.com/english/advisories/2011/0012nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0124nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0298nvdThird Party Advisory
- www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2nvdBroken Link
- www.osvdb.org/69241nvdBroken Link
News mentions
0No linked articles in our index yet.