CVE-2011-1598

Priority
Description
The bcm_release function in net/can/bcm.c in the Linux kernel before
2.6.39-rc6 does not properly validate a socket data structure, which allows
local users to cause a denial of service (NULL pointer dereference) or
possibly have unspecified other impact via a crafted release operation.
Ubuntu-Description
Oliver Hartkopp and Dave Jones discovered that the CAN network driver did
not correctly validate certain socket structures. If this driver was
loaded, a local attacker could crash the system, leading to a denial of
service.
Notes
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
More Information

Updated: 2019-12-05 20:57:00 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)