CVE-2023-54105

Source
https://cve.org/CVERecord?id=CVE-2023-54105
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54105.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54105
Downstream
Published
2025-12-24T13:06:30.053Z
Modified
2026-04-02T09:45:35.319640Z
Summary
can: isotp: check CAN address family in isotp_bind()
Details

In the Linux kernel, the following vulnerability has been resolved:

can: isotp: check CAN address family in isotp_bind()

Add missing check to block non-AF_CAN binds.

Syzbot created some code which matched the right sockaddr struct size but used AFXDP (0x2C) instead of AFCAN (0x1D) in the address family field:

bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r4, 0x0, r2}, 0x10) ^^^^ This has no funtional impact but the userspace should be notified about the wrong address family field content.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54105.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e057dd3fc20ffb3d7f150af46542a51b59b90127
Fixed
de3c02383aa678f6799402ac47fdd89cf4bfcaa9
Fixed
2fc6f337257f4f7c21ecff429241f7acaa6df4e8
Fixed
9427584c2f153d0677ef3bad6f44028c60d728c4
Fixed
dd4faace51e41a82a8c0770ee0cc26088f9d9d06
Fixed
c6adf659a8ba85913e16a571d5a9bcd17d3d1234

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54105.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.200
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.138
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54105.json"