CVE-2023-52922

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's CAN (Controller Area Network) subsystem. It allows local attackers to read freed kernel memory, potentially leading to information disclosure or kernel crashes. Systems running vulnerable Linux kernel versions with CAN support are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fixes in stable releases (check specific commits for exact ranges)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires CAN subsystem support (CONFIG_CAN_BCM). Many embedded systems and automotive systems use CAN.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, complete system compromise, or denial of service through kernel panic.

🟠

Likely Case

Information disclosure of kernel memory contents or system crash/denial of service.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from accessing /proc interfaces.

🌐 Internet-Facing: LOW - Requires local access to the system.
🏢 Internal Only: MEDIUM - Local users or compromised services could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to read /proc files. The bug is in procfs handling code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits: 11b8e27ed448, 3c3941bb1eb5, 55c3b96074f3, 9533dbfac0ff, 995f47d76647

Vendor Advisory: https://git.kernel.org/stable/c/11b8e27ed448baa385d90154a141466bd5e92f18

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable CAN BCM module

linux

Remove the vulnerable kernel module if not needed

sudo rmmod can_bcm

Restrict /proc access

linux

Limit access to /proc filesystem to prevent exploitation

sudo chmod 700 /proc/net/can/bcm

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernels
  • Implement strict access controls on /proc filesystem

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if can_bcm module is loaded: uname -r && lsmod | grep can_bcm

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after the fix commits and test /proc/net/can/bcm access

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN reports of use-after-free in bcm_proc_show

SIEM Query:

Search for kernel logs containing 'KASAN: slab-use-after-free in bcm_proc_show' or similar memory corruption errors

🔗 References

📤 Share & Export