First published: Wed Apr 20 2011(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2011-1598">CVE-2011-1598</a> Reported by Dave Jones. We can get here with a NULL socket argument passed from userspace, so we need to handle it accordingly. can/bcm release: <a href="http://permalink.gmane.org/gmane.linux.network/192898">http://permalink.gmane.org/gmane.linux.network/192898</a> <a href="https://access.redhat.com/security/cve/CVE-2011-1748">CVE-2011-1748</a> Reported by Oliver Hartkopp; can/raw release: can/raw release: <a href="http://permalink.gmane.org/gmane.linux.network/192974">http://permalink.gmane.org/gmane.linux.network/192974</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | =2.6.39-rc4 | |
Linux kernel | =2.6.39-rc1 | |
Linux kernel | =2.6.39-rc3 | |
Linux kernel | =2.6.39-rc2 | |
Linux kernel | =2.6.39-rc5 | |
Linux kernel | <2.6.39 | |
Linux kernel | =2.6.39 | |
Linux Kernel | <2.6.39 | |
Linux Kernel | =2.6.39 | |
Linux Kernel | =2.6.39-rc1 | |
Linux Kernel | =2.6.39-rc2 | |
Linux Kernel | =2.6.39-rc3 | |
Linux Kernel | =2.6.39-rc4 | |
Linux Kernel | =2.6.39-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1598 is classified as a medium severity vulnerability due to the potential for NULL pointer dereference leading to denial of service.
To fix CVE-2011-1598, you should upgrade your Linux kernel to a version higher than 2.6.39, as it includes the necessary patches.
CVE-2011-1598 affects Linux kernel versions up to and including 2.6.39 and its release candidates.
The impact of CVE-2011-1598 is a denial of service condition, which can cause the system to crash or become unresponsive.
CVE-2011-1598 was reported by Dave Jones.