-

CVE-2026-43411

tipc: fix divide-by-zero in tipc_sk_filter_connect()

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix divide-by-zero in tipc_sk_filter_connect()

A user can set conn_timeout to any value via
setsockopt(TIPC_CONN_TIMEOUT), including values less than 4.  When a
SYN is rejected with TIPC_ERR_OVERLOAD and the retry path in
tipc_sk_filter_connect() executes:

    delay %= (tsk->conn_timeout / 4);

If conn_timeout is in the range [0, 3], the integer division yields 0,
and the modulo operation triggers a divide-by-zero exception, causing a
kernel oops/panic.

Fix this by clamping conn_timeout to a minimum of 4 at the point of use
in tipc_sk_filter_connect().

Oops: divide error: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 119 Comm: poc-F144 Not tainted 7.0.0-rc2+
RIP: 0010:tipc_sk_filter_rcv (net/tipc/socket.c:2236 net/tipc/socket.c:2362)
Call Trace:
 tipc_sk_backlog_rcv (include/linux/instrumented.h:82 include/linux/atomic/atomic-instrumented.h:32 include/net/sock.h:2357 net/tipc/socket.c:2406)
 __release_sock (include/net/sock.h:1185 net/core/sock.c:3213)
 release_sock (net/core/sock.c:3797)
 tipc_connect (net/tipc/socket.c:2570)
 __sys_connect (include/linux/file.h:62 include/linux/file.h:83 net/socket.c:2098)
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < 600feb0a66a98c6b7f6f02b5f3612e75f9b8540f
Status affected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < 3bc9998041076ee05d3f312a22cee6b2ca35527f
Status affected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < 579956f9f297eb1b6a5d24de313f3acccee1f9d5
Status affected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < a360d3815aae1f00dd71b7714a846482e85cc1f7
Status affected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < c2ebfbe63deb7bfd4dc2532bae62a7ed67713272
Status affected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < 2754e7b3d64748643df867d1ea6fec522914b635
Status affected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < 338c5edeb6ae3f12a4b84dff9d71f6f7f8c202c3
Status affected
Version 6787927475e52f6933e3affce365dabb2aa2fadf
Version < 6c5a9baa15de240e747263aba435a0951da8d8d2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.20
Status affected
Version 0
Version < 4.20
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.094
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.