The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
Metrics
Affected Vendors & Products
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published: 2011-05-09T22:00:00.000Z
Updated: 2024-08-06T22:28:41.926Z
Reserved: 2011-04-05T00:00:00.000Z
Link: CVE-2011-1598
No data.
Status : Modified
Published: 2011-05-09T22:55:03.083
Modified: 2026-04-29T01:13:23.040
Link: CVE-2011-1598