{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2010-4526","title":"Title"},{"category":"description","text":"Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2010-4526","url":"https://www.suse.com/security/cve/CVE-2010-4526"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 662192 for CVE-2010-4526","url":"https://bugzilla.suse.com/662192"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:012","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:015","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON"}],"title":"SUSE CVE CVE-2010-4526","tracking":{"current_release_date":"2025-04-25T13:58:44Z","generator":{"date":"2023-02-15T05:55:40Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2010-4526","initial_release_date":"2023-02-15T05:55:40Z","revision_history":[{"date":"2023-02-15T05:55:40Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:07:52Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:31:52Z","number":"4","summary":"Current version"},{"date":"2025-03-14T07:55:42Z","number":"5","summary":"Current version"},{"date":"2025-03-16T14:28:18Z","number":"6","summary":"Current version"},{"date":"2025-04-25T13:58:44Z","number":"7","summary":"Current version"}],"status":"interim","version":"7"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp1:teradata"}}},{"category":"product_version","name":"btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34","product":{"name":"btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34","product_id":"btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34","product_identification_helper":{"purl":"pkg:rpm/suse/btrfs-kmp-default@0_2.6.32.29_0.3-0.3.34?upstream=ERROR_UNKNOWN-0_2.6.32.29_0.3-0.3.34.src.rpm"}}},{"category":"product_version","name":"btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163","product":{"name":"btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163","product_id":"btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163","product_identification_helper":{"purl":"pkg:rpm/suse/btrfs-kmp-pae@0_2.6.32.59_0.13-0.3.163?upstream=ERROR_UNKNOWN-0_2.6.32.59_0.13-0.3.163.src.rpm"}}},{"category":"product_version","name":"btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34","product":{"name":"btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34","product_id":"btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34","product_identification_helper":{"purl":"pkg:rpm/suse/btrfs-kmp-xen@0_2.6.32.29_0.3-0.3.34?upstream=ERROR_UNKNOWN-0_2.6.32.29_0.3-0.3.34.src.rpm"}}},{"category":"product_version","name":"ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2","product":{"name":"ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2","product_id":"ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2","product_identification_helper":{"purl":"pkg:rpm/suse/ext4dev-kmp-default@0_2.6.32.29_0.3-7.9.2?upstream=ext4dev-0_2.6.32.29_0.3-7.9.2.src.rpm"}}},{"category":"product_version","name":"ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130","product":{"name":"ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130","product_id":"ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130","product_identification_helper":{"purl":"pkg:rpm/suse/ext4dev-kmp-pae@0_2.6.32.59_0.13-7.9.130?upstream=ext4dev-0_2.6.32.59_0.13-7.9.130.src.rpm"}}},{"category":"product_version","name":"ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130","product":{"name":"ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130","product_id":"ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130","product_identification_helper":{"purl":"pkg:rpm/suse/ext4dev-kmp-trace@0_2.6.32.59_0.13-7.9.130?upstream=ext4dev-0_2.6.32.59_0.13-7.9.130.src.rpm"}}},{"category":"product_version","name":"ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2","product":{"name":"ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2","product_id":"ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2","product_identification_helper":{"purl":"pkg:rpm/suse/ext4dev-kmp-xen@0_2.6.32.29_0.3-7.9.2?upstream=ext4dev-0_2.6.32.29_0.3-7.9.2.src.rpm"}}},{"category":"product_version","name":"hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2","product":{"name":"hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2","product_id":"hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2","product_identification_helper":{"purl":"pkg:rpm/suse/hyper-v-kmp-default@0_2.6.32.29_0.3-0.10.2?upstream=ERROR_UNKNOWN-0_2.6.32.29_0.3-0.10.2.src.rpm"}}},{"category":"product_version","name":"hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39","product":{"name":"hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39","product_id":"hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39","product_identification_helper":{"purl":"pkg:rpm/suse/hyper-v-kmp-pae@0_2.6.32.59_0.13-0.18.39?upstream=ERROR_UNKNOWN-0_2.6.32.59_0.13-0.18.39.src.rpm"}}},{"category":"product_version","name":"hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39","product":{"name":"hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39","product_id":"hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39","product_identification_helper":{"purl":"pkg:rpm/suse/hyper-v-kmp-trace@0_2.6.32.59_0.13-0.18.39?upstream=ERROR_UNKNOWN-0_2.6.32.59_0.13-0.18.39.src.rpm"}}},{"category":"product_version","name":"kernel-default-2.6.32.29-0.3.1","product":{"name":"kernel-default-2.6.32.29-0.3.1","product_id":"kernel-default-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-default@2.6.32.29-0.3.1?upstream=kernel-default-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-default-base-2.6.32.29-0.3.1","product":{"name":"kernel-default-base-2.6.32.29-0.3.1","product_id":"kernel-default-base-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-default-base@2.6.32.29-0.3.1?upstream=kernel-default-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-default-devel-2.6.32.29-0.3.1","product":{"name":"kernel-default-devel-2.6.32.29-0.3.1","product_id":"kernel-default-devel-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-default-devel@2.6.32.29-0.3.1?upstream=kernel-default-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-default-man-2.6.32.59-0.15.2","product":{"name":"kernel-default-man-2.6.32.59-0.15.2","product_id":"kernel-default-man-2.6.32.59-0.15.2","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.59:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-default-man@2.6.32.59-0.15.2?upstream=kernel-default-2.6.32.59-0.15.2.src.rpm"}}},{"category":"product_version","name":"kernel-ec2-2.6.32.29-0.3.1","product":{"name":"kernel-ec2-2.6.32.29-0.3.1","product_id":"kernel-ec2-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-ec2@2.6.32.29-0.3.1?upstream=kernel-ec2-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-ec2-base-2.6.32.29-0.3.1","product":{"name":"kernel-ec2-base-2.6.32.29-0.3.1","product_id":"kernel-ec2-base-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-ec2-base@2.6.32.29-0.3.1?upstream=kernel-ec2-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-ec2-devel-2.6.32.59-0.15.2","product":{"name":"kernel-ec2-devel-2.6.32.59-0.15.2","product_id":"kernel-ec2-devel-2.6.32.59-0.15.2","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.59:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-ec2-devel@2.6.32.59-0.15.2?upstream=kernel-ec2-2.6.32.59-0.15.2.src.rpm"}}},{"category":"product_version","name":"kernel-pae-2.6.32.59-0.15.2","product":{"name":"kernel-pae-2.6.32.59-0.15.2","product_id":"kernel-pae-2.6.32.59-0.15.2","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.59:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-pae@2.6.32.59-0.15.2?upstream=kernel-pae-2.6.32.59-0.15.2.src.rpm"}}},{"category":"product_version","name":"kernel-pae-base-2.6.32.59-0.15.2","product":{"name":"kernel-pae-base-2.6.32.59-0.15.2","product_id":"kernel-pae-base-2.6.32.59-0.15.2","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.59:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-pae-base@2.6.32.59-0.15.2?upstream=kernel-pae-2.6.32.59-0.15.2.src.rpm"}}},{"category":"product_version","name":"kernel-pae-devel-2.6.32.59-0.15.2","product":{"name":"kernel-pae-devel-2.6.32.59-0.15.2","product_id":"kernel-pae-devel-2.6.32.59-0.15.2","product_identification_helper":{"purl":"pkg:rpm/suse/kernel-pae-devel@2.6.32.59-0.15.2?upstream=ERROR_UNKNOWN-2.6.32.59-0.15.2.src.rpm"}}},{"category":"product_version","name":"kernel-source-2.6.32.29-0.3.1","product":{"name":"kernel-source-2.6.32.29-0.3.1","product_id":"kernel-source-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-source@2.6.32.29-0.3.1?upstream=kernel-source-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-syms-2.6.32.29-0.3.1","product":{"name":"kernel-syms-2.6.32.29-0.3.1","product_id":"kernel-syms-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-syms@2.6.32.29-0.3.1?upstream=kernel-source-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-trace-2.6.32.29-0.3.1","product":{"name":"kernel-trace-2.6.32.29-0.3.1","product_id":"kernel-trace-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-trace@2.6.32.29-0.3.1?upstream=kernel-trace-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-trace-base-2.6.32.29-0.3.1","product":{"name":"kernel-trace-base-2.6.32.29-0.3.1","product_id":"kernel-trace-base-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-trace-base@2.6.32.29-0.3.1?upstream=kernel-trace-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-trace-devel-2.6.32.29-0.3.1","product":{"name":"kernel-trace-devel-2.6.32.29-0.3.1","product_id":"kernel-trace-devel-2.6.32.29-0.3.1","product_identification_helper":{"purl":"pkg:rpm/suse/kernel-trace-devel@2.6.32.29-0.3.1?upstream=ERROR_UNKNOWN-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-xen-2.6.32.29-0.3.1","product":{"name":"kernel-xen-2.6.32.29-0.3.1","product_id":"kernel-xen-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-xen@2.6.32.29-0.3.1?upstream=kernel-xen-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-xen-base-2.6.32.29-0.3.1","product":{"name":"kernel-xen-base-2.6.32.29-0.3.1","product_id":"kernel-xen-base-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-xen-base@2.6.32.29-0.3.1?upstream=kernel-xen-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"kernel-xen-devel-2.6.32.29-0.3.1","product":{"name":"kernel-xen-devel-2.6.32.29-0.3.1","product_id":"kernel-xen-devel-2.6.32.29-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kernel-xen-devel@2.6.32.29-0.3.1?upstream=kernel-xen-2.6.32.29-0.3.1.src.rpm"}}},{"category":"product_version","name":"xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product":{"name":"xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product_id":"xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product_identification_helper":{"cpe":"cpe:2.3:o:xen:xen:4.0.3_21548_16_2.6.32.59_0.15:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/xen-kmp-default@4.0.3_21548_16_2.6.32.59_0.15-0.5.26?upstream=xen-4.0.3_21548_16_2.6.32.59_0.15-0.5.26.src.rpm"}}},{"category":"product_version","name":"xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product":{"name":"xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product_id":"xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product_identification_helper":{"cpe":"cpe:2.3:o:xen:xen:4.0.3_21548_16_2.6.32.59_0.15:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/xen-kmp-pae@4.0.3_21548_16_2.6.32.59_0.15-0.5.26?upstream=xen-4.0.3_21548_16_2.6.32.59_0.15-0.5.26.src.rpm"}}},{"category":"product_version","name":"xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product":{"name":"xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product_id":"xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","product_identification_helper":{"cpe":"cpe:2.3:o:xen:xen:4.0.3_21548_16_2.6.32.59_0.15:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/xen-kmp-trace@4.0.3_21548_16_2.6.32.59_0.15-0.5.26?upstream=xen-4.0.3_21548_16_2.6.32.59_0.15-0.5.26.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34"},"product_reference":"btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163"},"product_reference":"btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34"},"product_reference":"btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2"},"product_reference":"ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130"},"product_reference":"ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130"},"product_reference":"ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2"},"product_reference":"ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2"},"product_reference":"hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39"},"product_reference":"hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39"},"product_reference":"hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-2.6.32.29-0.3.1"},"product_reference":"kernel-default-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-base-2.6.32.29-0.3.1"},"product_reference":"kernel-default-base-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-devel-2.6.32.29-0.3.1"},"product_reference":"kernel-default-devel-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-man-2.6.32.59-0.15.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-man-2.6.32.59-0.15.2"},"product_reference":"kernel-default-man-2.6.32.59-0.15.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-2.6.32.29-0.3.1"},"product_reference":"kernel-ec2-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-base-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-base-2.6.32.29-0.3.1"},"product_reference":"kernel-ec2-base-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-devel-2.6.32.59-0.15.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-devel-2.6.32.59-0.15.2"},"product_reference":"kernel-ec2-devel-2.6.32.59-0.15.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-pae-2.6.32.59-0.15.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-2.6.32.59-0.15.2"},"product_reference":"kernel-pae-2.6.32.59-0.15.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-pae-base-2.6.32.59-0.15.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-base-2.6.32.59-0.15.2"},"product_reference":"kernel-pae-base-2.6.32.59-0.15.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-pae-devel-2.6.32.59-0.15.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-devel-2.6.32.59-0.15.2"},"product_reference":"kernel-pae-devel-2.6.32.59-0.15.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-source-2.6.32.29-0.3.1"},"product_reference":"kernel-source-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-syms-2.6.32.29-0.3.1"},"product_reference":"kernel-syms-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-2.6.32.29-0.3.1"},"product_reference":"kernel-trace-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-base-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-base-2.6.32.29-0.3.1"},"product_reference":"kernel-trace-base-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-devel-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-devel-2.6.32.29-0.3.1"},"product_reference":"kernel-trace-devel-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-2.6.32.29-0.3.1"},"product_reference":"kernel-xen-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-base-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-base-2.6.32.29-0.3.1"},"product_reference":"kernel-xen-base-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-devel-2.6.32.29-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-devel-2.6.32.29-0.3.1"},"product_reference":"kernel-xen-devel-2.6.32.29-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26"},"product_reference":"xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26"},"product_reference":"xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26"},"product_reference":"xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"}]},"vulnerabilities":[{"cve":"CVE-2010-4526","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2010-4526"}],"notes":[{"category":"general","text":"Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34","SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163","SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39","SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-devel-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-man-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-devel-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-base-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-devel-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-source-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-syms-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-devel-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-devel-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26"]},"references":[{"category":"external","summary":"CVE-2010-4526","url":"https://www.suse.com/security/cve/CVE-2010-4526"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 662192 for CVE-2010-4526","url":"https://bugzilla.suse.com/662192"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:012","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:015","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-default-0_2.6.32.29_0.3-0.3.34","SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-pae-0_2.6.32.59_0.13-0.3.163","SUSE Linux Enterprise Server 11 SP1-TERADATA:btrfs-kmp-xen-0_2.6.32.29_0.3-0.3.34","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-default-0_2.6.32.29_0.3-7.9.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-pae-0_2.6.32.59_0.13-7.9.130","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-trace-0_2.6.32.59_0.13-7.9.130","SUSE Linux Enterprise Server 11 SP1-TERADATA:ext4dev-kmp-xen-0_2.6.32.29_0.3-7.9.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-default-0_2.6.32.29_0.3-0.10.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-pae-0_2.6.32.59_0.13-0.18.39","SUSE Linux Enterprise Server 11 SP1-TERADATA:hyper-v-kmp-trace-0_2.6.32.59_0.13-0.18.39","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-devel-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-default-man-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-ec2-devel-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-base-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-pae-devel-2.6.32.59-0.15.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-source-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-syms-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-trace-devel-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-base-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:kernel-xen-devel-2.6.32.29-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26","SUSE Linux Enterprise Server 11 SP1-TERADATA:xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26"]}],"threats":[{"category":"impact","date":"2013-06-28T06:19:26Z","details":"important"}],"title":"CVE-2010-4526"}]}