CVE-2022-49269

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
21/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: isotp: sanitize CAN ID checks in isotp_bind()<br /> <br /> Syzbot created an environment that lead to a state machine status that<br /> can not be reached with a compliant CAN ID address configuration.<br /> The provided address information consisted of CAN ID 0x6000001 and 0xC28001<br /> which both boil down to 11 bit CAN IDs 0x001 in sending and receiving.<br /> <br /> Sanitize the SFF/EFF CAN ID values before performing the address checks.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10 (including) 5.10.110 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.19 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 5.17.2 (excluding)