In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds If the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.
History

Wed, 13 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-21T15:32:10.616Z

Updated: 2024-11-04T14:54:26.015Z

Reserved: 2024-05-21T15:19:24.264Z

Link: CVE-2023-52878

cve-icon Vulnrichment

Updated: 2024-08-02T23:18:41.163Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-21T16:15:24.450

Modified: 2024-11-21T08:40:46.920

Link: CVE-2023-52878

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-21T00:00:00Z

Links: CVE-2023-52878 - Bugzilla