In the Linux kernel, the following vulnerability has been resolved:
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
If the "struct can_priv::echoo_skb" is accessed out of bounds, this
would cause a kernel crash. Instead, issue a meaningful warning
message and return with an error.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T08:27:45.656Z
Reserved: 2024-05-21T15:19:24.264Z
Link: CVE-2023-52878

Updated: 2024-08-02T23:18:41.163Z

Status : Awaiting Analysis
Published: 2024-05-21T16:15:24.450
Modified: 2024-11-21T08:40:46.920
Link: CVE-2023-52878
