Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1187

Опубликовано: 19 фев. 2010
Источник: redhat
CVSS2: 6.1
EPSS Низкий

Описание

The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.

Отчет

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2010-1187. This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include support for Transparent Inter-Process Communication Protocol (TIPC). A future kernel update in Red Hat Enterprise Linux 5 may address this flaw.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=578057kernel: tipc: Fix oops on send prior to entering networked mode

EPSS

Процентиль: 21%
0.00066
Низкий

6.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.

nvd
около 15 лет назад

The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.

debian
около 15 лет назад

The Transparent Inter-Process Communication (TIPC) functionality in Li ...

github
около 3 лет назад

The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.

oracle-oval
почти 15 лет назад

ELSA-2010-0504: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 21%
0.00066
Низкий

6.1 Medium

CVSS2