CVE-2023-52887
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2023-52887 affects the Linux kernel's CAN (Controller Area Network) J1939 protocol implementation. The vulnerability was discovered in the handling of RTS (Request to Send) messages in the transport layer, specifically in scenarios where RTS messages arrive in close succession (Kernel Git).

Technical details

The vulnerability exists in the xtp_rx_rts_session_new function within the Linux kernel's CAN J1939 transport layer implementation. The issue occurs when handling closely timed RTS messages, where the original implementation used a less informative WARNONONCE backtrace mechanism that didn't properly handle concurrent sessions (Kernel Git).

Impact

When exploited, this vulnerability could lead to improper error handling in the CAN bus communication, potentially causing system instability or denial of service conditions when multiple RTS messages are received in rapid succession (Ubuntu Security).

Mitigation and workarounds

The issue has been patched in the Linux kernel by implementing enhanced error handling that provides clearer error messages and allows for early termination of problematic sessions. The fix includes proper session management and improved error reporting through netdev_alert messages (Kernel Git).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management