Unrated severityNVD Advisory· Published Dec 29, 2010· Updated Apr 29, 2026
CVE-2010-3874
CVE-2010-3874
Description
Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
Affected products
8- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
29- www.spinics.net/lists/netdev/msg145791.htmlnvdMailing ListPatchThird Party Advisory
- www.spinics.net/lists/netdev/msg146469.htmlnvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlnvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/11/03/3nvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/11/04/4nvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/12/20/2nvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/12/20/3nvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/12/20/4nvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/12/20/5nvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/12/21/1nvdMailing ListThird Party Advisory
- secunia.com/advisories/42745nvdThird Party Advisory
- secunia.com/advisories/42778nvdThird Party Advisory
- secunia.com/advisories/42801nvdThird Party Advisory
- secunia.com/advisories/42890nvdThird Party Advisory
- secunia.com/advisories/42932nvdThird Party Advisory
- www.debian.org/security/2010/dsa-2126nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0958.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2011-0007.htmlnvdThird Party Advisory
- www.vupen.com/english/advisories/2010/3321nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0012nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0124nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0298nvdThird Party Advisory
- www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2nvdBroken Link
News mentions
0No linked articles in our index yet.