CVE Vulnerabilities

CVE-2010-1187

NULL Pointer Dereference

Published: Mar 31, 2010 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
6.1 IMPORTANT
AV:A/AC:L/Au:N/C:N/I:N/A:C
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux2.6.16 (excluding)2.6.33 (including)
Linux_kernelLinux2.6.16 (including)2.6.16 (including)
Linux_kernelLinux2.6.16-rc1 (including)2.6.16-rc1 (including)
Linux_kernelLinux2.6.16-rc2 (including)2.6.16-rc2 (including)
Linux_kernelLinux2.6.16-rc3 (including)2.6.16-rc3 (including)
Linux_kernelLinux2.6.16-rc4 (including)2.6.16-rc4 (including)
Linux_kernelLinux2.6.16-rc5 (including)2.6.16-rc5 (including)
Linux_kernelLinux2.6.16-rc6 (including)2.6.16-rc6 (including)
Linux_kernelLinux2.6.16-rc7 (including)2.6.16-rc7 (including)
Red Hat Enterprise Linux 5RedHatkernel-0:2.6.18-194.8.1.el5*
LinuxUbuntuhardy*
LinuxUbuntuintrepid*
LinuxUbuntujaunty*
LinuxUbuntukarmic*
LinuxUbuntulucid*
LinuxUbuntuupstream*
Linux-source-2.6.15Ubuntuupstream*

Potential Mitigations

References