CVE-2022-49844
01.05.2025, 15:16
In the Linux kernel, the following vulnerability has been resolved:
can: dev: fix skb drop check
In commit a6d190f8c767 ("can: skb: drop tx skb if in listen only
mode") the priv->ctrlmode element is read even on virtual CAN
interfaces that do not create the struct can_priv at startup. This
out-of-bounds read may lead to CAN frame drops for virtual CAN
interfaces like vcan and vxcan.
This patch mainly reverts the original commit and adds a new helper
for CAN interface drivers that provide the required information in
struct can_priv.
[mkl: patch pch_can, too]Enginsight| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 6.0 ≤ 𝑥 < 6.0.9 |
| linux | linux_kernel | 6.1:rc1 |
| linux | linux_kernel | 6.1:rc2 |
| linux | linux_kernel | 6.1:rc3 |
| linux | linux_kernel | 6.1:rc4 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration