In the Linux kernel, the following vulnerability has been resolved:
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
If the "struct can_priv::echoo_skb" is accessed out of bounds, this
would cause a kernel crash. Instead, issue a meaningful warning
message and return with an error.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Apr 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
Vendors & Products |
Redhat rhel Eus
|
Wed, 13 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |

Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T15:32:10.616Z
Updated: 2025-05-04T07:45:00.765Z
Reserved: 2024-05-21T15:19:24.264Z
Link: CVE-2023-52878

Updated: 2024-08-02T23:18:41.163Z

Status : Awaiting Analysis
Published: 2024-05-21T16:15:24.450
Modified: 2024-11-21T08:40:46.920
Link: CVE-2023-52878
