We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: can: af_can: fix NULL pointer dereference in can_rcv_filter Analogue to commit 8aa59e355949 ("can: af_can: fix NULL pointer dereference in can_rx_register()") we need to check for a missing initialization of ml_priv in the receive path of CAN frames. Since commit 4e096a18867a ("net: introduce CAN specific pointer in the struct net_device") the check for dev->type to be ARPHRD_CAN is not sufficient anymore since bonding or tun netdevices claim to be CAN devices but do not initialize ml_priv accordingly.
Reserved 2024-08-22 | Published 2024-10-21 | Updated 2024-11-04 | Assigner Linuxgit.kernel.org/...c/3982652957e8d79ac32efcb725450580650a8644
git.kernel.org/...c/c42221efb1159d6a3c89e96685ee38acdce86b6f
git.kernel.org/...c/c142cba37de29f740a3852f01f59876af8ae462a
git.kernel.org/...c/fcc63f2f7ee3038d53216edd0d8291e57c752557
git.kernel.org/...c/0acc442309a0a1b01bcdaa135e56e6398a49439c
Support options