First published: Tue Jan 11 2011(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
debian/user-mode-linux | ||
Linux Kernel | >=2.6.11.1<=2.6.33 | |
Linux Kernel | =2.6.11-rc2 | |
Linux Kernel | =2.6.11-rc3 | |
Linux Kernel | =2.6.11-rc4 | |
Linux Kernel | =2.6.11-rc5 | |
Red Hat Enterprise MRG | =1.0 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4526 has been classified as a medium severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2010-4526, users should upgrade to a fixed version of the Linux kernel that addresses this race condition.
CVE-2010-4526 affects Linux kernel versions from 2.6.11-rc2 to 2.6.33 inclusive.
CVE-2010-4526 is caused by a race condition in the sctp_icmp_proto_unreachable function of the Linux kernel.
CVE-2010-4526 can be exploited by remote attackers sending an ICMP unreachable message to a locked socket, leading to a denial of service.