CVE-2010-1187

The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.9 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:N/I:N/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 20%
VendorProductVersion
linuxlinux_kernel
2.6.16 <
𝑥
≤ 2.6.33
linuxlinux_kernel
2.6.16
linuxlinux_kernel
2.6.16:rc1
linuxlinux_kernel
2.6.16:rc2
linuxlinux_kernel
2.6.16:rc3
linuxlinux_kernel
2.6.16:rc4
linuxlinux_kernel
2.6.16:rc5
linuxlinux_kernel
2.6.16:rc6
linuxlinux_kernel
2.6.16:rc7
canonicalubuntu_linux
12.04
debiandebian_linux
5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
lucid
Fixed 2.6.32-22.35
released
karmic
Fixed 2.6.31-22.60
released
jaunty
Fixed 2.6.28-19.61
released
intrepid
ignored
hardy
Fixed 2.6.24-28.70
released
dapper
dne
linux-source-2.6.15
lucid
dne
karmic
dne
jaunty
dne
intrepid
dne
hardy
dne
dapper
not-affected
References