CVE-2023-54105

Published: Dic 24, 2025 Last Modified: Dic 29, 2025
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

can: isotp: check CAN address family in isotp_bind()

Add missing check to block non-AF_CAN binds.

Syzbot created some code which matched the right sockaddr struct size
but used AF_XDP (0x2C) instead of AF_CAN (0x1D) in the address family
field:

bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r4, 0x0, r2}, 0x10)
^^^^
This has no funtional impact but the userspace should be notified about
the wrong address family field content.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0002
Percentile
0,1th
Updated

EPSS Score Trend (Last 83 Days)

https://git.kernel.org/stable/c/2fc6f337257f4f7c21ecff429241f7acaa6df4e8
https://git.kernel.org/stable/c/9427584c2f153d0677ef3bad6f44028c60d728c4
https://git.kernel.org/stable/c/c6adf659a8ba85913e16a571d5a9bcd17d3d1234
https://git.kernel.org/stable/c/dd4faace51e41a82a8c0770ee0cc26088f9d9d06
https://git.kernel.org/stable/c/de3c02383aa678f6799402ac47fdd89cf4bfcaa9