CVE-2025-39986

Source
https://cve.org/CVERecord?id=CVE-2025-39986
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39986.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39986
Downstream
Related
Published
2025-10-15T07:56:05.143Z
Modified
2026-03-20T12:43:08.156530Z
Summary
can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

can: sun4ican: populate ndochange_mtu() to prevent buffer overflow

Sending an PFPACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN driver. The only check which is performed by the PFPACKET framework is to make sure that skb->len fits the interface's MTU.

Unfortunately, because the sun4ican driver does not populate its netdeviceops->ndochange_mtu(), it is possible for an attacker to configure an invalid MTU by doing, for example:

$ ip link set can0 mtu 9999

After doing so, the attacker could open a PFPACKET socket using the ETHP_CANXL protocol:

socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

struct canxl_frame frame = {
    .flags = 0xff,
    .len = 2048,
};

The CAN drivers' xmit() function are calling candevdroppedskb() to check that the skb is valid, unfortunately under above conditions, the malicious packet is able to go through candevdroppedskb() checks:

  1. the skb->protocol is set to ETHPCANXL which is valid (the function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, sun4icanstartxmit() receives a CAN XL frame which it is not able to correctly handle and will thus misinterpret it as a CAN frame.

This can result in a buffer overflow. The driver will consume cf->len as-is with no further checks on this line:

dlc = cf->len;

Here, cf->len corresponds to the flags field of the CAN XL frame. In our previous example, we set canxl_frame->flags to 0xff. Because the maximum expected length is 8, a buffer overflow of 247 bytes occurs a couple line below when doing:

for (i = 0; i < dlc; i++)
    writel(cf->data[i], priv->base + (dreg + i * 4));

Populate netdeviceops->ndochangemtu() to ensure that the interface's MTU can not be set to anything bigger than CAN_MTU. By fixing the root cause, this prevents the buffer overflow.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39986.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0738eff14d817a02ab082c392c96a1613006f158
Fixed
063539db42203b29d5aa2adf0cae3d68c646a6b6
Fixed
4f382cc887adca8478b9d3e6b81aa6698a95fff4
Fixed
60463a1c138900494cb3adae41142a11cd8feb3c
Fixed
a61ff7ac93270d20ca426c027d6d01c8ac8e904c
Fixed
2e423e1990f3972cbea779883fef52c2f2acb858
Fixed
de77841652e57afbc46e9e1dbf51ee364fc008e1
Fixed
7f7b21026a6febdb749f6f6f950427245aa86cce
Fixed
61da0bd4102c459823fbe6b8b43b01fb6ace4a22

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39986.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.4.0
Fixed
5.4.300
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.245
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.194
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.155
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.109
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.50
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39986.json"