CVE-2023-52878

Source
https://cve.org/CVERecord?id=CVE-2023-52878
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52878.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52878
Downstream
Related
Published
2024-05-21T15:32:10.616Z
Modified
2026-03-20T12:32:51.306885Z
Summary
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
Details

In the Linux kernel, the following vulnerability has been resolved:

can: dev: canputechoskb(): don't crash kernel if canpriv::echo_skb is accessed out of bounds

If the "struct canpriv::echooskb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52878.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a6e4bc5304033e434fabccabb230b8e9ff55d76f
Fixed
826120c9ba68f2d0dbae58e99013929c883d1444
Fixed
0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4
Fixed
53c468008a7c9ca3f5fc985951f35ec2acae85bc
Fixed
8ab67da060157362b2e0926692c659808784708f
Fixed
6411959c10fe917288cbb1038886999148560057

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52878.json"