In the Linux kernel, the following vulnerability has been resolved:
can: dev: fix skb drop check
In commit a6d190f8c767 ("can: skb: drop tx skb if in listen only
mode") the priv->ctrlmode element is read even on virtual CAN
interfaces that do not create the struct can_priv at startup. This
out-of-bounds read may lead to CAN frame drops for virtual CAN
interfaces like vcan and vxcan.
This patch mainly reverts the original commit and adds a new helper
for CAN interface drivers that provide the required information in
struct can_priv.
[mkl: patch pch_can, too]
References
Configurations
Configuration 1 (hide)
|
History
07 May 2025, 13:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* |
|
CWE | CWE-125 | |
References | () https://git.kernel.org/stable/c/386c49fe31ee748e053860b3bac7794a933ac9ac - Patch | |
References | () https://git.kernel.org/stable/c/ae64438be1923e3c1102d90fd41db7afcfaf54cc - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Linux linux Kernel
Linux |
02 May 2025, 13:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 May 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 15:16
Updated : 2025-05-07 13:32
NVD link : CVE-2022-49844
Mitre link : CVE-2022-49844
CVE.ORG link : CVE-2022-49844
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read