CVE-2023-52878

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds If the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/826120c9ba68f2d0dbae58e99013929c883d1444 - () https://git.kernel.org/stable/c/826120c9ba68f2d0dbae58e99013929c883d1444 - Patch, Mailing List
References () https://git.kernel.org/stable/c/6411959c10fe917288cbb1038886999148560057 - () https://git.kernel.org/stable/c/6411959c10fe917288cbb1038886999148560057 - Patch, Mailing List
References () https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4 - () https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4 - Patch, Mailing List
References () https://git.kernel.org/stable/c/53c468008a7c9ca3f5fc985951f35ec2acae85bc - () https://git.kernel.org/stable/c/53c468008a7c9ca3f5fc985951f35ec2acae85bc - Patch, Mailing List
References () https://git.kernel.org/stable/c/8ab67da060157362b2e0926692c659808784708f - () https://git.kernel.org/stable/c/8ab67da060157362b2e0926692c659808784708f - Patch, Mailing List
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 May 2024, 16:53

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-03-05 18:54


NVD link : CVE-2023-52878

Mitre link : CVE-2023-52878


JSON object : View

Products Affected

linux

  • linux_kernel
CWE

No CWE.