
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49269 affects the Linux kernel's CAN (Controller Area Network) ISO-TP protocol implementation. The vulnerability was discovered in the isotp_bind() function where improper validation of CAN ID checks could lead to a state machine status that should not be reachable with a compliant CAN ID address configuration (NVD, Kernel Commit).
The issue occurs in the isotpbind() function where CAN ID values were not properly sanitized before performing address checks. The vulnerability was triggered when using address information consisting of CAN ID 0x6000001 and 0xC28001, which both resolve to 11-bit CAN IDs 0x001 in sending and receiving operations. The fix involves sanitizing the SFF/EFF CAN ID values by properly masking them with CANEFFFLAG and CANEFFMASK or CANSFF_MASK depending on the ID type (Kernel Commit).
The vulnerability could allow an attacker to create invalid state machine conditions in the CAN ISO-TP protocol implementation, potentially affecting the reliability and security of CAN bus communications in affected systems (NVD).
The vulnerability has been fixed in the Linux kernel through a patch that properly sanitizes CAN ID values in the isotp_bind() function. Users should update to a kernel version that includes the fix (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."