In the Linux kernel, the following vulnerability has been resolved: can: gsusb: gsusbreceivebulkcallback(): check actuallength before accessing data The URB received in gsusbreceivebulkcallback() contains a struct gshostframe. The length of the data after the header depends on the gshostframe hf::flags and the active device features (e.g. time stamping). Introduce a new function gsusbgetminimumlength() and check that we have at least received the required amount of data before accessing it. Only copy the data to that skb that has actually been received. [mkl: rename gsusbgetminimumlength() -> +gsusbgetminimumrx_length()]