CVE-2021-47668
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's CAN (Controller Area Network) subsystem. When exploited, it allows local attackers to cause memory corruption, potentially leading to system crashes or privilege escalation. It affects Linux systems with CAN networking enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to root, kernel panic causing system crash, or arbitrary code execution in kernel context.
Likely Case
System instability, kernel crashes, or denial of service affecting CAN network functionality.
If Mitigated
Limited impact if CAN subsystem is disabled or not in use, with potential for crashes but no privilege escalation.
🎯 Exploit Status
Requires local access and knowledge of CAN subsystem. Memory corruption vulnerabilities can be challenging to exploit reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with fixes (see git.kernel.org references in CVE)
Vendor Advisory: https://git.kernel.org/stable/c/03f16c5075b22c8902d2af739969e878b0879c94
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable CAN subsystem
linuxIf CAN networking is not required, disable the kernel module to eliminate attack surface.
sudo modprobe -r can
sudo modprobe -r can_raw
sudo modprobe -r can_dev
echo 'blacklist can' | sudo tee /etc/modprobe.d/blacklist-can.conf
🧯 If You Can't Patch
- Disable CAN subsystem modules if not needed
- Restrict local user access to systems with CAN enabled
🔍 How to Verify
Check if Vulnerable:
Check if CAN modules are loaded: lsmod | grep -i can. Check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated to patched version and CAN modules are either disabled or system is stable with CAN enabled.
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crashes/panics
- CAN subsystem errors in dmesg
Network Indicators:
- Unusual CAN network traffic patterns
SIEM Query:
source="kernel" AND ("Oops" OR "panic" OR "BUG") AND ("can" OR "CAN")
🔗 References
- https://git.kernel.org/stable/c/03f16c5075b22c8902d2af739969e878b0879c94
- https://git.kernel.org/stable/c/08ab951787098ae0b6c0364aeea7a8138226f234
- https://git.kernel.org/stable/c/260925a0b7d2da5449f8ecfd02c1405e0c8a45b8
- https://git.kernel.org/stable/c/593c072b7b3c4d7044416eb039d9ad706bedd67a
- https://git.kernel.org/stable/c/92668d28c7e6a7a2ba07df287669ffcdf650c421
- https://git.kernel.org/stable/c/ac48ef15826e83f4206c47add61072e8fc76d328
- https://git.kernel.org/stable/c/bbc6847b9b8978b520f62fbc7c68c54ef0f8d282