The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.

Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2053-1 New Linux 2.6.26 packages fix several issues
EUVD EUVD EUVD-2010-1217 The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.
Ubuntu USN Ubuntu USN USN-947-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T01:14:06.682Z

Reserved: 2010-03-30T00:00:00.000Z

Link: CVE-2010-1187

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-03-31T18:00:00.517

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-1187

cve-icon Redhat

Severity : Important

Publid Date: 2010-02-19T00:00:00Z

Links: CVE-2010-1187 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses