CVE-2010-4526

Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819
http://secunia.com/advisories/42964 Broken Link
http://secunia.com/advisories/46397 Broken Link
http://www.openwall.com/lists/oss-security/2011/01/04/13 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/01/04/3 Mailing List Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0163.html Broken Link
http://www.securityfocus.com/archive/1/520102/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/45661 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2011-0012.html Third Party Advisory
http://www.vupen.com/english/advisories/2011/0169 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/64616 Third Party Advisory VDB Entry
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819
http://secunia.com/advisories/42964 Broken Link
http://secunia.com/advisories/46397 Broken Link
http://www.openwall.com/lists/oss-security/2011/01/04/13 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/01/04/3 Mailing List Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0163.html Broken Link
http://www.securityfocus.com/archive/1/520102/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/45661 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2011-0012.html Third Party Advisory
http://www.vupen.com/english/advisories/2011/0169 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/64616 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819 -
References () http://secunia.com/advisories/42964 - Broken Link () http://secunia.com/advisories/42964 - Broken Link
References () http://secunia.com/advisories/46397 - Broken Link () http://secunia.com/advisories/46397 - Broken Link
References () http://www.openwall.com/lists/oss-security/2011/01/04/13 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/01/04/13 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/01/04/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/01/04/3 - Mailing List, Patch, Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-0163.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2011-0163.html - Broken Link
References () http://www.securityfocus.com/archive/1/520102/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/520102/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/45661 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/45661 - Third Party Advisory, VDB Entry
References () http://www.vmware.com/security/advisories/VMSA-2011-0012.html - Third Party Advisory () http://www.vmware.com/security/advisories/VMSA-2011-0012.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2011/0169 - Broken Link () http://www.vupen.com/english/advisories/2011/0169 - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4526 - Issue Tracking, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64616 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/64616 - Third Party Advisory, VDB Entry

Information

Published : 2011-01-11 03:00

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4526

Mitre link : CVE-2010-4526

CVE.ORG link : CVE-2010-4526


JSON object : View

Products Affected

linux

  • linux_kernel

redhat

  • enterprise_mrg

vmware

  • esx
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')