We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49844

can: dev: fix skb drop check



Description

In the Linux kernel, the following vulnerability has been resolved: can: dev: fix skb drop check In commit a6d190f8c767 ("can: skb: drop tx skb if in listen only mode") the priv->ctrlmode element is read even on virtual CAN interfaces that do not create the struct can_priv at startup. This out-of-bounds read may lead to CAN frame drops for virtual CAN interfaces like vcan and vxcan. This patch mainly reverts the original commit and adds a new helper for CAN interface drivers that provide the required information in struct can_priv. [mkl: patch pch_can, too]

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

a6d190f8c7670068d8c154ef8477eca07b5e3574 before 386c49fe31ee748e053860b3bac7794a933ac9ac
affected

a6d190f8c7670068d8c154ef8477eca07b5e3574 before ae64438be1923e3c1102d90fd41db7afcfaf54cc
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.0.9
unaffected

6.1
unaffected

References

git.kernel.org/...c/386c49fe31ee748e053860b3bac7794a933ac9ac

git.kernel.org/...c/ae64438be1923e3c1102d90fd41db7afcfaf54cc

cve.org (CVE-2022-49844)

nvd.nist.gov (CVE-2022-49844)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49844

Support options

Helpdesk Chat, Email, Knowledgebase