The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:28:41.926Z
Reserved: 2011-04-05T00:00:00
Link: CVE-2011-1598

No data.

Status : Modified
Published: 2011-05-09T22:55:03.083
Modified: 2024-11-21T01:26:40.887
Link: CVE-2011-1598
