In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds If the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-21T15:32:10.616Z

Updated: 2024-08-02T23:18:41.163Z

Reserved: 2024-05-21T15:19:24.264Z

Link: CVE-2023-52878

cve-icon Vulnrichment

Updated: 2024-08-02T23:18:41.163Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-21T16:15:24.450

Modified: 2024-05-21T16:53:56.550

Link: CVE-2023-52878

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-21T00:00:00Z

Links: CVE-2023-52878 - Bugzilla