CVE-2011-1748
09.05.2011, 22:55
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 2.6.39 |
linux | linux_kernel | 2.6.39 |
linux | linux_kernel | 2.6.39:rc1 |
linux | linux_kernel | 2.6.39:rc2 |
linux | linux_kernel | 2.6.39:rc3 |
linux | linux_kernel | 2.6.39:rc4 |
linux | linux_kernel | 2.6.39:rc5 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
linux |
| ||||||||||
linux-ec2 |
| ||||||||||
linux-fsl-imx51 |
| ||||||||||
linux-lts-backport-maverick |
| ||||||||||
linux-lts-backport-natty |
| ||||||||||
linux-mvl-dove |
| ||||||||||
linux-source-2.6.15 |
| ||||||||||
linux-ti-omap4 |
|
Common Weakness Enumeration
References