CVE-2025-38224
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's kvaser_pciefd driver, where the handling logic for echo_skb_max (which defines the upper limit of an array used internally) was incorrect. The driver rounded echo_skb_max up to the nearest power of two, causing the tx/ack indices to potentially exceed the array boundary. This led to out-of-bounds memory access detected by KASAN, which can cause crashes or undefined behavior.
How can this vulnerability impact me? :
The vulnerability can cause out-of-bounds memory reads within the kvaser_pciefd driver, potentially leading to system instability, crashes, or undefined behavior in the Linux kernel. This could affect systems using this driver for CAN communication, possibly impacting reliability and security.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for KASAN (Kernel Address Sanitizer) slab-out-of-bounds errors related to kvaser_pciefd_handle_ack_packet. You can check the kernel log messages using commands like 'dmesg | grep kvaser_pciefd' or 'journalctl -k | grep kvaser_pciefd' to look for error reports indicating out-of-bounds memory access in the kvaser_pciefd driver.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is fixed, as the issue was resolved by refining the echo_skb_max handling logic in the kvaser_pciefd driver. If updating is not immediately possible, consider disabling or unloading the kvaser_pciefd driver to prevent triggering the vulnerable code paths.