Null pointer dereference in Linux kernel - CVE-2010-1187

 

Null pointer dereference in Linux kernel - CVE-2010-1187

Published: March 31, 2010 / Updated: August 13, 2020


Vulnerability identifier: #VU95198
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2010-1187
CWE-ID: CWE-476
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.


How to mitigate CVE-2010-1187

Install update from vendor's repository.

Sources