CVE-2010-1187
31.03.2010, 18:00
The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 2.6.16 < 𝑥 ≤ 2.6.33 |
linux | linux_kernel | 2.6.16 |
linux | linux_kernel | 2.6.16:rc1 |
linux | linux_kernel | 2.6.16:rc2 |
linux | linux_kernel | 2.6.16:rc3 |
linux | linux_kernel | 2.6.16:rc4 |
linux | linux_kernel | 2.6.16:rc5 |
linux | linux_kernel | 2.6.16:rc6 |
linux | linux_kernel | 2.6.16:rc7 |
canonical | ubuntu_linux | 12.04 |
debian | debian_linux | 5.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References