DescriptionThe Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
Note from the SUSE Security TeamAll shipping Linux kernels in products have CONFIG_TIPC=n, meaning TIPC support disabled. This means we are not affected by this issue. SUSE Bugzilla entry: 592573 [RESOLVED / FIXED] No SUSE Security Announcements cross referenced.
SUSE Timeline for this CVECVE page created: Tue Jul 9 16:57:14 2013
CVE page last modified: Fri Oct 7 12:45:54 2022