Bug 2363469 (CVE-2022-49844) - CVE-2022-49844 kernel: can: dev: fix skb drop check
Summary: CVE-2022-49844 kernel: can: dev: fix skb drop check
Keywords:
Status: NEW
Alias: CVE-2022-49844
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-01 15:05 UTC by OSIDB Bzimport
Modified: 2025-05-02 03:27 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-01 15:05:54 UTC
In the Linux kernel, the following vulnerability has been resolved:

can: dev: fix skb drop check

In commit a6d190f8c767 ("can: skb: drop tx skb if in listen only
mode") the priv->ctrlmode element is read even on virtual CAN
interfaces that do not create the struct can_priv at startup. This
out-of-bounds read may lead to CAN frame drops for virtual CAN
interfaces like vcan and vxcan.

This patch mainly reverts the original commit and adds a new helper
for CAN interface drivers that provide the required information in
struct can_priv.

[mkl: patch pch_can, too]

Comment 1 Avinash Hanwate 2025-05-02 03:19:10 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050141-CVE-2022-49844-e0b9@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.