First published: Fri Nov 12 2010(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.37 | |
Linux Kernel | =2.6.37 | |
Linux Kernel | =2.6.37-rc1 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4165 has been assigned a severity level that can lead to denial of service conditions.
To remediate CVE-2010-4165, it is recommended to upgrade your Linux kernel to a version later than 2.6.37.
CVE-2010-4165 affects versions of the Linux kernel prior to 2.6.37, including specific distributions like Debian and openSUSE.
CVE-2010-4165 allows local users to cause a denial of service (OOPS) through improper handling of TCP_MAXSEG values.
CVE-2010-4165 is not exploitable remotely as it requires local user access to trigger the vulnerability.