CVE-2025-38665
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's CAN (Controller Area Network) subsystem. It occurs when a CAN device is restarted from a Bus Off state and the driver does not implement the required callback function can_priv::do_set_mode. The vulnerability happens because the kernel code attempts to call this callback without checking if it is set, leading to a NULL pointer dereference and potential kernel crash or instability.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable when a CAN device is restarted improperly, potentially leading to denial of service or system instability in environments using CAN devices.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the Linux kernel is updated to a version where the fix is applied. The fix prevents NULL pointer dereference by refusing manual restart or configuring automatic restart delay in can_changelink() and reporting errors properly. Therefore, applying the kernel update that includes this patch is the immediate step to prevent exploitation.