Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: can: dev: fix skb drop check In commit a6d190f8c767 ("can: skb: drop tx skb if in listen only mode") the priv->ctrlmode element is read even on virtual CAN interfaces that do not create the struct can_priv at startup. This out-of-bounds read may lead to CAN frame drops for virtual CAN interfaces like vcan and vxcan. This patch mainly reverts the original commit and adds a new helper for CAN interface drivers that provide the required information in struct can_priv. [mkl: patch pch_can, too]
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.0, < 6.0.9 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/386c49fe31ee748e053860b3bac7794a933ac9acPatch
- https://git.kernel.org/stable/c/ae64438be1923e3c1102d90fd41db7afcfaf54ccPatch
FAQ
What is CVE-2022-49844?
CVE-2022-49844 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: can: dev: fix skb drop check In commit a6d190f8c767 ("can: skb: drop tx skb if in listen only mode") the priv->ctrlmode element is...
How severe is CVE-2022-49844?
CVE-2022-49844 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49844?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.