Hide Forgot
CVE-2011-1598 Reported by Dave Jones. We can get here with a NULL socket argument passed from userspace, so we need to handle it accordingly. can/bcm release: http://permalink.gmane.org/gmane.linux.network/192898 CVE-2011-1748 Reported by Oliver Hartkopp; can/raw release: can/raw release: http://permalink.gmane.org/gmane.linux.network/192974
Reported by Oliver Hartkopp; can/raw release: http://permalink.gmane.org/gmane.linux.network/192974 Acknowledgements CVE-2011-1748: Red Hat would like to thank Oliver Hartkopp for reporting this issue.
Statement: The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not include support for the CAN protocol, and therefore are not affected by this issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0836.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.
note that the two patches in comment 1 and comment 2 address two separate issues in the same protocol. Same bug, different code paths.
Upstream commits: CVE-2011-1598 http://git.kernel.org/linus/c6914a6f261aca0c9f715f883a353ae7ff51fe83 CVE-2011-1748 http://git.kernel.org/linus/10022a6c66e199d8f61d9044543f38785713cbbd
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0836 https://rhn.redhat.com/errata/RHSA-2011-0836.html
Acknowledgements CVE-2011-1598: (none)
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2011:1253 https://rhn.redhat.com/errata/RHSA-2011-1253.html