CVE-2025-39985
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's mcba_usb CAN driver. The driver does not properly implement the ndo_change_mtu() function, allowing an attacker to set an invalid MTU value (e.g., 9999). This enables the attacker to send malicious CAN XL frames through a PF_PACKET socket that bypass normal CAN framework checks. The mcba_usb driver misinterprets these frames, leading to a buffer overflow because it copies more data than expected into a fixed-size buffer. This buffer overflow can cause memory corruption and potentially allow further exploitation.
How can this vulnerability impact me? :
The vulnerability can lead to a buffer overflow in the mcba_usb CAN driver, which may cause memory corruption. This can result in system instability, crashes, or potentially allow an attacker to execute arbitrary code with kernel privileges. Essentially, it compromises the security and reliability of systems using the affected driver, potentially leading to denial of service or privilege escalation.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the MTU of the mcba_usb CAN interface has been set to an invalid value larger than the CAN_MTU. For example, use the command: ip link show can0 to check the MTU value. Also, monitor for any unusual PF_PACKET socket usage with ETH_P_CANXL protocol, which can be done by inspecting socket creation or network traffic related to CAN XL frames. Specifically, look for commands or processes that execute: ip link set can0 mtu 9999 or similar. Additionally, checking for raw PF_PACKET sockets with ETH_P_CANXL protocol can help identify attempts to exploit this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to ensure that the mcba_usb driver populates the ndo_change_mtu() operation to prevent setting the MTU to values larger than CAN_MTU. Until a patched kernel is applied, avoid allowing MTU changes on the CAN interface to values larger than CAN_MTU. You can also restrict or monitor the use of PF_PACKET sockets with ETH_P_CANXL protocol to prevent injection of malicious CAN XL frames. Applying the vendor's kernel update that includes the fix is the definitive mitigation.