CVE-2023-52922
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2023-52922 is a Use-After-Free (UAF) vulnerability discovered in the Linux kernel's CAN (Controller Area Network) broadcast manager (BCM) protocol implementation. The vulnerability specifically affects the bcmprocshow() function where bcmop is freed before the procfs entry is removed in bcmrelease(), potentially leading to reading of freed memory (Kernel Git).

Technical details

The vulnerability occurs in the Linux kernel's CAN BCM implementation where a race condition leads to a Use-After-Free scenario. The issue manifests when bcmprocshow() attempts to access memory that has already been freed, specifically at address ffff888155846230. This vulnerability was discovered using the Kernel Address Sanitizer (KASAN) which detected the slab-use-after-free condition (Kernel Git).

Impact

When exploited, this vulnerability could lead to memory corruption in the Linux kernel's CAN subsystem. The UAF condition could potentially allow an attacker to read previously freed memory, which could contain sensitive information or lead to system instability (NVD).

Mitigation and workarounds

The vulnerability has been patched by modifying the order of operations in bcmrelease(), ensuring that the procfs entry is removed before freeing bcmop. The fix was committed to the Linux kernel and backported to stable versions. Users should update their Linux kernel to a version containing the fix (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management