CVE-2023-54105
Description
In the Linux kernel, the following vulnerability has been resolved:
can: isotp: check CAN address family in isotp_bind()
Add missing check to block non-AF_CAN binds.
Syzbot created some code which matched the right sockaddr struct size but used AF_XDP (0x2C) instead of AF_CAN (0x1D) in the address family field:
bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r4, 0x0, r2}, 0x10) ^^^^ This has no funtional impact but the userspace should be notified about the wrong address family field content.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing CAN address family check in Linux kernel's isotp_bind() allows non-AF_CAN binds, causing a silent failure without functional impact.
The Linux kernel's CAN ISOTP (ISO 15765-2) socket implementation did not verify that the address family passed to isotp_bind() is AF_CAN. The bind() system call accepted any sockaddr structure that matched the expected size, even if the address family field (e.g., AF_XDP, value 0x2C) was incorrect. This lack of validation meant that binds from non-CAN sockets (such as those created by syzkaller) were incorrectly allowed.
Exploitation of this issue requires the ability to create sockets and issue bind system calls, which is available to any unprivileged user on the system. By submitting a crafted sockaddr with a valid size but an arbitrary address family (e.g., AF_XDP), an attacker could make isotp_bind() succeed without actually establishing a CAN association. The kernel would not reject the incorrect address family, and no functional impact resulted from this mismatch.
While this vulnerability has no practical security impact—no code execution, privilege escalation, or denial of service is possible—it violates the principle that userspace should be notified of invalid address family usage. The fix adds a missing check to return an error code (EAFNOSUPPORT) when the address family is not AF_CAN, ensuring proper validation and returning meaningful feedback to the caller [1][2].
The Linux kernel stable branches addressed this flaw in commits (referenced as [1] and [2]), which should be backported to affected long-term and stable releases. No workaround is necessary for most users; applying the latest stable or distro kernel updates is recommended.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5de3c02383aa62fc6f337257f9427584c2f15dd4faace51e4c6adf659a8baVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/2fc6f337257f4f7c21ecff429241f7acaa6df4e8nvd
- git.kernel.org/stable/c/9427584c2f153d0677ef3bad6f44028c60d728c4nvd
- git.kernel.org/stable/c/c6adf659a8ba85913e16a571d5a9bcd17d3d1234nvd
- git.kernel.org/stable/c/dd4faace51e41a82a8c0770ee0cc26088f9d9d06nvd
- git.kernel.org/stable/c/de3c02383aa678f6799402ac47fdd89cf4bfcaa9nvd
News mentions
0No linked articles in our index yet.