In the Linux kernel, the following vulnerability has been resolved: can: m_can: m_can_tx_handler(): fix use after free of skb can_put_echo_skb() will clone skb then free the skb. Move the can_put_echo_skb() for the m_can version 3.0.x directly before the start of the xmit in hardware, similar to the 3.1.x branch.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49275-9e36@gregkh/T