CVE-2011-1748
09.05.2011, 22:55
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 𝑥 < 2.6.39 |
| linux | linux_kernel | 2.6.39 |
| linux | linux_kernel | 2.6.39:rc1 |
| linux | linux_kernel | 2.6.39:rc2 |
| linux | linux_kernel | 2.6.39:rc3 |
| linux | linux_kernel | 2.6.39:rc4 |
| linux | linux_kernel | 2.6.39:rc5 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| linux |
| ||||||||||
| linux-ec2 |
| ||||||||||
| linux-fsl-imx51 |
| ||||||||||
| linux-lts-backport-maverick |
| ||||||||||
| linux-lts-backport-natty |
| ||||||||||
| linux-mvl-dove |
| ||||||||||
| linux-source-2.6.15 |
| ||||||||||
| linux-ti-omap4 |
|
Common Weakness Enumeration
References