CVE-2022-49275

Source
https://cve.org/CVERecord?id=CVE-2022-49275
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49275.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49275
Downstream
Related
Published
2025-02-26T01:56:20.066Z
Modified
2026-03-20T12:22:18.383341Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
can: m_can: m_can_tx_handler(): fix use after free of skb
Details

In the Linux kernel, the following vulnerability has been resolved:

can: mcan: mcantxhandler(): fix use after free of skb

canputechoskb() will clone skb then free the skb. Move the canputechoskb() for the m_can version 3.0.x directly before the start of the xmit in hardware, similar to the 3.1.x branch.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49275.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
80646733f11c2e9de3b6339f7e635047e6087280
Fixed
d93ed9aff64968f4cdad690712eb4f48ae537bde
Fixed
d3892a747ab16b1eb6593a19d29f62c3b3f020ac
Fixed
7728d937ec403a1ceff9483023252d2cb8777f81
Fixed
08d90846e438ac22dc56fc49ec0b0d195831c5ed
Fixed
869016a2938ac44f7b2fb7fc22c89edad99eb9b3
Fixed
f43e64076ff1b1dcb893fb77ad1204105f710a29
Fixed
4db7d6f481990dd179a9ee7126dc7aa31ea4fff3
Fixed
31417073493f302d26ab66b3abc098d43227b835
Fixed
2e8e79c416aae1de224c0f1860f2e3350fa171f8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49275.json"