-
CVE-2025-39985
- EPSS 0.06%
- Veröffentlicht 15.10.2025 07:56:04
- Zuletzt bearbeitet 16.10.2025 15:29:11
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow
Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb->len fits the interface's MTU.
Unfortunately, because the mcba_usb driver does not populate its
net_device_ops->ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:
$ ip link set can0 mtu 9999
After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:
socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))
to inject a malicious CAN XL frames. For example:
struct canxl_frame frame = {
.flags = 0xff,
.len = 2048,
};
The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:
1. the skb->protocol is set to ETH_P_CANXL which is valid (the
function does not check the actual device capabilities).
2. the length is a valid CAN XL length.
And so, mcba_usb_start_xmit() receives a CAN XL frame which it is not
able to correctly handle and will thus misinterpret it as a CAN frame.
This can result in a buffer overflow. The driver will consume cf->len
as-is with no further checks on these lines:
usb_msg.dlc = cf->len;
memcpy(usb_msg.data, cf->data, usb_msg.dlc);
Here, cf->len corresponds to the flags field of the CAN XL frame. In
our previous example, we set canxl_frame->flags to 0xff. Because the
maximum expected length is 8, a buffer overflow of 247 bytes occurs!
Populate net_device_ops->ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU. By
fixing the root cause, this prevents the buffer overflow.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
0fa9303c4b9493727e0d3a6ac3729300e3013930
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
Version <
37aed407496bf6de8910e588edb04d2435fa7011
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
Version <
6eec67bfb25637f9b51e584cf59ddace59925bc8
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
Version <
ca4e51359608e1f29bf1f2c33c3ddf775b6b7ed1
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
Version <
3664ae91b26d1fd7e4cee9cde17301361f4c89d5
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
Version <
6b9fb82df8868dbe9ffea5874b8d35f951faedbb
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
Version <
b638c3fb0f163e69785ceddb3b434a9437878bec
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
Version <
17c8d794527f01def0d1c8b7dc2d7b8d34fed0e6
Version
51f3baad7de943780ce0c17bd7975df567dd6e14
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.12
Status
affected
Version <
4.12
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.300
Status
unaffected
Version <=
5.10.*
Version
5.10.245
Status
unaffected
Version <=
5.15.*
Version
5.15.194
Status
unaffected
Version <=
6.1.*
Version
6.1.155
Status
unaffected
Version <=
6.6.*
Version
6.6.109
Status
unaffected
Version <=
6.12.*
Version
6.12.50
Status
unaffected
Version <=
6.16.*
Version
6.16.10
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.195 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|