CVE-2025-39987
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's CAN (Controller Area Network) driver hi311x. It occurs because the driver does not properly implement the ndo_change_mtu() function, allowing an attacker to set an invalid MTU (Maximum Transmission Unit) size. By doing so, the attacker can send malicious CAN XL frames through a PF_PACKET socket that bypass normal CAN framework checks. The hi3110 driver misinterprets these frames and copies data without proper length validation, leading to a buffer overflow.
How can this vulnerability impact me? :
This vulnerability can lead to a buffer overflow in the hi3110 CAN driver, which may cause memory corruption. Such memory corruption can potentially be exploited to crash the system, cause denial of service, or execute arbitrary code with kernel privileges, depending on the attacker's goals and environment.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if any CAN network interface has an invalid MTU set above the CAN_MTU limit. For example, use the command: ip link show can0 to check the MTU value of the CAN interface. If the MTU is set to an unusually high value (e.g., 9999), it indicates a potential exploitation attempt. Additionally, monitoring for PF_PACKET sockets opened with the ETH_P_CANXL protocol could indicate attempts to inject malicious CAN XL frames.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves ensuring that the net_device_ops->ndo_change_mtu() is properly populated to prevent setting the MTU above the CAN_MTU limit. Until a patch is applied, avoid allowing MTU changes on CAN interfaces to values larger than CAN_MTU. You should also restrict or monitor the creation of PF_PACKET sockets with the ETH_P_CANXL protocol to prevent injection of malicious CAN XL frames.