Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 12 Nov 2010 08:19:57 -0500 (EST)
From: Josh Bressers <>
Cc: "Steven M. Christey" <>
Subject: Re: CVE request: kernel: possible kernel oops from
 user MSS

----- "Eugene Teo" <> wrote:

> With commit f5fff5dc8a7a3f395b0525c02ba92c95d42b7390, a user program
> can pass in TCP_MAXSEG of 12 (or TCPOLEN_TSTAMP_ALIGNED), and cause
> kernel oops with division by 0 in tcp_select_initial_window.
> Proposed patch:
> Reference:

Please use CVE-2010-4165.



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ