The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.9 | MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
CWE ID | Type | Source |
---|---|---|
CWE-476 | Primary | nvd@nist.gov |