CVE-2023-52878

Source
https://cve.org/CVERecord?id=CVE-2023-52878
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52878.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52878
Downstream
Related
Published
2024-05-21T15:32:10.616Z
Modified
2026-04-11T12:46:37.714966Z
Summary
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
Details

In the Linux kernel, the following vulnerability has been resolved:

can: dev: canputechoskb(): don't crash kernel if canpriv::echo_skb is accessed out of bounds

If the "struct canpriv::echooskb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52878.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a6e4bc5304033e434fabccabb230b8e9ff55d76f
Fixed
826120c9ba68f2d0dbae58e99013929c883d1444
Fixed
0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4
Fixed
53c468008a7c9ca3f5fc985951f35ec2acae85bc
Fixed
8ab67da060157362b2e0926692c659808784708f
Fixed
6411959c10fe917288cbb1038886999148560057

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52878.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.33
Fixed
5.15.139
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.63
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.12
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52878.json"