In the Linux kernel, the following vulnerability has been resolved:
can: m_can: m_can_tx_handler(): fix use after free of skb
can_put_echo_skb() will clone skb then free the skb. Move the
can_put_echo_skb() for the m_can version 3.0.x directly before the
start of the xmit in hardware, similar to the 3.1.x branch.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-416 | |
Metrics |
cvssV3_1
|
ssvc
|
Thu, 27 Feb 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:15:00 +0000

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T01:56:20.066Z
Updated: 2025-03-04T18:07:17.587Z
Reserved: 2025-02-26T01:49:39.298Z
Link: CVE-2022-49275

Updated: 2025-03-04T18:03:20.559Z

Status : Awaiting Analysis
Published: 2025-02-26T07:01:04.370
Modified: 2025-03-04T18:15:23.383
Link: CVE-2022-49275
