The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2011-05-09T22:00:00
Updated: 2024-08-06T22:28:41.926Z
Reserved: 2011-04-05T00:00:00
Link: CVE-2011-1598
Vulnrichment
No data.
NVD
Status : Modified
Published: 2011-05-09T22:55:03.083
Modified: 2024-11-21T01:26:40.887
Link: CVE-2011-1598
Redhat