Upstream information
Description
The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| National Vulnerability Database | |
|---|---|
| Base Score | 4.9 | 
| Vector | AV:L/AC:L/Au:N/C:N/I:N/A:C | 
| Access Vector | Local | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | None | 
| Integrity Impact | None | 
| Availability Impact | Complete | 
Note from the SUSE Security Team
All shipping Linux kernels in products have CONFIG_TIPC=n, meaning TIPC support disabled. This means we are not affected by this issue. SUSE Bugzilla entry: 592573 [RESOLVED / FIXED] No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Tue Jul 9 16:57:14 2013CVE page last modified: Fri Oct 7 12:45:54 2022