Описание
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise MRG 1 | realtime-kernel | Affected | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2011:0836 | 01.06.2011 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2011:1253 | 12.09.2011 |
Показывать по
Дополнительная информация
Статус:
4.9 Medium
CVSS2
Связанные уязвимости
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
The raw_release function in net/can/raw.c in the Linux kernel before 2 ...
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
ELSA-2011-2019: Oracle Linux 6 Unbreakable Enterprise kernel security fix update (IMPORTANT)
4.9 Medium
CVSS2