
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52887 affects the Linux kernel's CAN (Controller Area Network) J1939 protocol implementation. The vulnerability was discovered in the handling of RTS (Request to Send) messages in the transport layer, specifically in scenarios where RTS messages arrive in close succession (Kernel Git).
The vulnerability exists in the xtp_rx_rts_session_new function within the Linux kernel's CAN J1939 transport layer implementation. The issue occurs when handling closely timed RTS messages, where the original implementation used a less informative WARNONONCE backtrace mechanism that didn't properly handle concurrent sessions (Kernel Git).
When exploited, this vulnerability could lead to improper error handling in the CAN bus communication, potentially causing system instability or denial of service conditions when multiple RTS messages are received in rapid succession (Ubuntu Security).
The issue has been patched in the Linux kernel by implementing enhanced error handling that provides clearer error messages and allows for early termination of problematic sessions. The fix includes proper session management and improved error reporting through netdev_alert messages (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."