net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new
This patch enhances error handling in scenarios with RTS (Request to
Send) messages arriving closely. It replaces the less informative WARN_ON_ONCE
backtraces with a new error handling method. This provides clearer error
messages and allows for the early termination of problematic sessions.
Previously, sessions were only released at the end of j1939_xtp_rx_rts().
Potentially this could be reproduced with something like:
testj1939 -r vcan0:0x80 &
while true; do
# send first RTS
cansend vcan0 18EC8090#1014000303002301;
# send second RTS
cansend vcan0 18EC8090#1014000303002301;
# send abort
cansend vcan0 18EC8090#ff00000000002301;
done
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 28 May 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Thu, 22 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 03 Sep 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T07:45:21.979Z
Reserved: 2024-05-21T15:35:00.782Z
Link: CVE-2023-52887

Updated: 2024-08-02T23:18:41.317Z

Status : Awaiting Analysis
Published: 2024-07-29T16:15:03.150
Modified: 2024-11-21T08:40:48.320
Link: CVE-2023-52887


Updated: 2025-07-12T15:42:34Z