VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54105

CVE-2023-54105

Description

In the Linux kernel, the following vulnerability has been resolved:

can: isotp: check CAN address family in isotp_bind()

Add missing check to block non-AF_CAN binds.

Syzbot created some code which matched the right sockaddr struct size but used AF_XDP (0x2C) instead of AF_CAN (0x1D) in the address family field:

bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r4, 0x0, r2}, 0x10) ^^^^ This has no funtional impact but the userspace should be notified about the wrong address family field content.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing CAN address family check in Linux kernel's isotp_bind() allows non-AF_CAN binds, causing a silent failure without functional impact.

The Linux kernel's CAN ISOTP (ISO 15765-2) socket implementation did not verify that the address family passed to isotp_bind() is AF_CAN. The bind() system call accepted any sockaddr structure that matched the expected size, even if the address family field (e.g., AF_XDP, value 0x2C) was incorrect. This lack of validation meant that binds from non-CAN sockets (such as those created by syzkaller) were incorrectly allowed.

Exploitation of this issue requires the ability to create sockets and issue bind system calls, which is available to any unprivileged user on the system. By submitting a crafted sockaddr with a valid size but an arbitrary address family (e.g., AF_XDP), an attacker could make isotp_bind() succeed without actually establishing a CAN association. The kernel would not reject the incorrect address family, and no functional impact resulted from this mismatch.

While this vulnerability has no practical security impact—no code execution, privilege escalation, or denial of service is possible—it violates the principle that userspace should be notified of invalid address family usage. The fix adds a missing check to return an error code (EAFNOSUPPORT) when the address family is not AF_CAN, ensuring proper validation and returning meaningful feedback to the caller [1][2].

The Linux kernel stable branches addressed this flaw in commits (referenced as [1] and [2]), which should be backported to affected long-term and stable releases. No workaround is necessary for most users; applying the latest stable or distro kernel updates is recommended.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.