c5251bc7fb
CVE-2010-4165: possible kernel oops from user MSS
31 lines
997 B
Diff
31 lines
997 B
Diff
From 9f3ec7da60ef8443addc35828214f129590495f2 Mon Sep 17 00:00:00 2001
|
|
From: David S. Miller <davem@davemloft.net>
|
|
Date: Wed, 24 Nov 2010 11:47:22 -0800
|
|
Subject: tcp: Make TCP_MAXSEG minimum more correct.
|
|
|
|
|
|
From: David S. Miller <davem@davemloft.net>
|
|
|
|
[ Upstream commit c39508d6f118308355468314ff414644115a07f3 ]
|
|
|
|
Use TCP_MIN_MSS instead of constant 64.
|
|
|
|
Reported-by: Min Zhang <mzhang@mvista.com>
|
|
Signed-off-by: David S. Miller <davem@davemloft.net>
|
|
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
|
|
---
|
|
net/ipv4/tcp.c | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
--- a/net/ipv4/tcp.c
|
|
+++ b/net/ipv4/tcp.c
|
|
@@ -2246,7 +2246,7 @@ static int do_tcp_setsockopt(struct sock
|
|
/* Values greater than interface MTU won't take effect. However
|
|
* at the point when this call is done we typically don't yet
|
|
* know which interface is going to be used */
|
|
- if (val < 64 || val > MAX_TCP_WINDOW) {
|
|
+ if (val < TCP_MIN_MSS || val > MAX_TCP_WINDOW) {
|
|
err = -EINVAL;
|
|
break;
|
|
}
|