一、 漏洞 CVE-2022-49269 基础信息
漏洞标题
can: isotp: 在isotp_bind()中对CAN ID进行合法性检查
来源:AIGC 神龙大模型
漏洞描述信息
在Linux内核中,已修复了以下漏洞: can: isotp: 在isotp_bind()中对CAN ID检查进行校验 Syzbot创建了一个无法通过合规的CAN ID地址配置达到的状态机状态。提供的地址信息包括CAN ID 0x6000001和0xC28001,这两个ID在发送和接收时都简化为11位CAN ID 0x001。 在执行地址检查之前,对SFF/EFF CAN ID值进行校验。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
来源:AIGC 神龙大模型
漏洞类别
输入验证不恰当
来源:AIGC 神龙大模型
漏洞标题
can: isotp: sanitize CAN ID checks in isotp_bind()
来源:美国国家漏洞数据库 NVD
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved: can: isotp: sanitize CAN ID checks in isotp_bind() Syzbot created an environment that lead to a state machine status that can not be reached with a compliant CAN ID address configuration. The provided address information consisted of CAN ID 0x6000001 and 0xC28001 which both boil down to 11 bit CAN IDs 0x001 in sending and receiving. Sanitize the SFF/EFF CAN ID values before performing the address checks.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2022-49269 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2022-49269 的情报信息
  • 标题: can: isotp: sanitize CAN ID checks in isotp_bind() - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: can: isotp: sanitize CAN ID checks in isotp_bind() - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: can: isotp: sanitize CAN ID checks in isotp_bind() - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: can: isotp: sanitize CAN ID checks in isotp_bind() - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: can: isotp: sanitize CAN ID checks in isotp_bind() - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • https://nvd.nist.gov/vuln/detail/CVE-2022-49269