In the Linux kernel, the following vulnerability has been resolved:
can: dev: canputechoskb(): don't crash kernel if canpriv::echo_skb is accessed out of bounds
If the "struct canpriv::echooskb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52878.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52878.json"
[
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4",
"digest": {
"function_hash": "180548695764272940808099423409285163353",
"length": 914.0
},
"id": "CVE-2023-52878-2a669863",
"deprecated": false,
"target": {
"file": "drivers/net/can/dev/skb.c",
"function": "can_put_echo_skb"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4",
"digest": {
"line_hashes": [
"209343666927790319430285497563407528140",
"88763634699663085546243101204357391803",
"135979079754482119589339673114150315895",
"261347742569828057133491004917623102444"
],
"threshold": 0.9
},
"id": "CVE-2023-52878-57484ce6",
"deprecated": false,
"target": {
"file": "drivers/net/can/dev/skb.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6411959c10fe917288cbb1038886999148560057",
"digest": {
"line_hashes": [
"209343666927790319430285497563407528140",
"88763634699663085546243101204357391803",
"135979079754482119589339673114150315895",
"261347742569828057133491004917623102444"
],
"threshold": 0.9
},
"id": "CVE-2023-52878-643acc68",
"deprecated": false,
"target": {
"file": "drivers/net/can/dev/skb.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6411959c10fe917288cbb1038886999148560057",
"digest": {
"function_hash": "180548695764272940808099423409285163353",
"length": 914.0
},
"id": "CVE-2023-52878-73f88eeb",
"deprecated": false,
"target": {
"file": "drivers/net/can/dev/skb.c",
"function": "can_put_echo_skb"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53c468008a7c9ca3f5fc985951f35ec2acae85bc",
"digest": {
"function_hash": "180548695764272940808099423409285163353",
"length": 914.0
},
"id": "CVE-2023-52878-8fce03f2",
"deprecated": false,
"target": {
"file": "drivers/net/can/dev/skb.c",
"function": "can_put_echo_skb"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53c468008a7c9ca3f5fc985951f35ec2acae85bc",
"digest": {
"line_hashes": [
"209343666927790319430285497563407528140",
"88763634699663085546243101204357391803",
"135979079754482119589339673114150315895",
"261347742569828057133491004917623102444"
],
"threshold": 0.9
},
"id": "CVE-2023-52878-beb135ce",
"deprecated": false,
"target": {
"file": "drivers/net/can/dev/skb.c"
}
}
]