CVE-2023-52878

Updated: 2026-02-27 01:54:55.323602

Description:

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds If the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2025-09-23 11:16:34 This flaw is confined to the Linux CAN networking stack and only triggers when a CAN interface is pr...
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-07-02 14:25:14 Ignored due to low severity
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-07-02 14:25:14 Ignored due to low severity
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-07-09 05:15:19 Ignored due to low severity
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-07-09 05:15:19 Ignored due to low severity
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-07-03 10:07:23 Ignored due to low severity
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-07-02 14:25:14 Ignored due to low severity
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-07-02 17:22:34 Ignored due to low severity
Ubuntu 16.04 ELS linux-hwe 4.15.0 5.5 MEDIUM Ignored 2025-03-11 00:55:14 Ignored due to low severity
Ubuntu 16.04 ELS linux 4.4.0 5.5 MEDIUM Ignored 2025-03-11 00:55:12 Ignored due to low severity
Total: 11