CVE-2022-28390
📋 TL;DR
This vulnerability is a double-free memory corruption flaw in the EMS CAN-USB driver in the Linux kernel. It allows local attackers to potentially crash the system or execute arbitrary code with kernel privileges. Systems using the ems_usb CAN driver are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Hci Baseboard Management Controller by Netapp
View all CVEs affecting Hci Baseboard Management Controller →
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel-level code execution leading to complete system compromise.
Likely Case
Kernel panic or system crash causing denial of service.
If Mitigated
Limited impact if driver not loaded or system not using CAN-USB devices.
🎯 Exploit Status
Requires local access and knowledge of driver usage patterns.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel 5.17.2 and later
Vendor Advisory: https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
Restart Required: Yes
Instructions:
1. Update kernel to 5.17.2 or later. 2. Reboot system. 3. Verify kernel version with 'uname -r'.
🔧 Temporary Workarounds
Disable ems_usb driver
linuxPrevent loading of vulnerable driver module
echo 'blacklist ems_usb' >> /etc/modprobe.d/blacklist-ems_usb.conf
rmmod ems_usb
🧯 If You Can't Patch
- Ensure ems_usb driver is not loaded (check with 'lsmod | grep ems_usb')
- Restrict physical and local access to systems using CAN-USB devices
🔍 How to Verify
Check if Vulnerable:
Check kernel version with 'uname -r' and verify if <= 5.17.1, then check if ems_usb module is loaded with 'lsmod | grep ems_usb'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is >= 5.17.2 with 'uname -r' and ensure ems_usb module is not loaded or updated
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crash/panic logs
- CAN driver error messages
Network Indicators:
- Unusual CAN bus traffic patterns
SIEM Query:
source="kernel" AND ("oops" OR "panic" OR "ems_usb")
🔗 References
- https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
- https://security.netapp.com/advisory/ntap-20220513-0001/
- https://www.debian.org/security/2022/dsa-5127
- https://www.debian.org/security/2022/dsa-5173
- https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
- https://security.netapp.com/advisory/ntap-20220513-0001/
- https://www.debian.org/security/2022/dsa-5127
- https://www.debian.org/security/2022/dsa-5173