4.9
CVE-2011-1748
- EPSS 0.05%
- Veröffentlicht 09.05.2011 22:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version < 2.6.39
Linux ≫ Linux Kernel Version2.6.39 Update-
Linux ≫ Linux Kernel Version2.6.39 Updaterc1
Linux ≫ Linux Kernel Version2.6.39 Updaterc2
Linux ≫ Linux Kernel Version2.6.39 Updaterc3
Linux ≫ Linux Kernel Version2.6.39 Updaterc4
Linux ≫ Linux Kernel Version2.6.39 Updaterc5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.122 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.9 | 3.9 | 6.9 |
AV:L/AC:L/Au:N/C:N/I:N/A:C
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.