CVE-2023-52878

Source
https://cve.org/CVERecord?id=CVE-2023-52878
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52878.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52878
Downstream
Related
Published
2024-05-21T15:32:10.616Z
Modified
2026-05-15T04:07:50.677831592Z
Summary
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
Details

In the Linux kernel, the following vulnerability has been resolved:

can: dev: canputechoskb(): don't crash kernel if canpriv::echo_skb is accessed out of bounds

If the "struct canpriv::echooskb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52878.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.33
Fixed
5.15.139
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.63
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.12
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52878.json"