CVE-2025-39987

Source
https://cve.org/CVERecord?id=CVE-2025-39987
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39987.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39987
Downstream
Related
Published
2025-10-15T07:56:05.878Z
Modified
2026-03-11T05:39:22.317328Z
Summary
can: hi311x: populate ndo_change_mtu() to prevent buffer overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

can: hi311x: populate ndochangemtu() to prevent buffer overflow

Sending an PFPACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN driver. The only check which is performed by the PFPACKET framework is to make sure that skb->len fits the interface's MTU.

Unfortunately, because the sun4ican driver does not populate its netdeviceops->ndochange_mtu(), it is possible for an attacker to configure an invalid MTU by doing, for example:

$ ip link set can0 mtu 9999

After doing so, the attacker could open a PFPACKET socket using the ETHP_CANXL protocol:

socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

struct canxl_frame frame = {
    .flags = 0xff,
    .len = 2048,
};

The CAN drivers' xmit() function are calling candevdroppedskb() to check that the skb is valid, unfortunately under above conditions, the malicious packet is able to go through candevdroppedskb() checks:

  1. the skb->protocol is set to ETHPCANXL which is valid (the function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, hi3110hardstart_xmit() receives a CAN XL frame which it is not able to correctly handle and will thus misinterpret it as a CAN frame. The driver will consume frame->len as-is with no further checks.

This can result in a buffer overflow later on in hi3110hwtx() on this line:

memcpy(buf + HI3110_FIFO_EXT_DATA_OFF,
       frame->data, frame->len);

Here, frame->len corresponds to the flags field of the CAN XL frame. In our previous example, we set canxl_frame->flags to 0xff. Because the maximum expected length is 8, a buffer overflow of 247 bytes occurs!

Populate netdeviceops->ndochangemtu() to ensure that the interface's MTU can not be set to anything bigger than CAN_MTU. By fixing the root cause, this prevents the buffer overflow.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39987.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
57e83fb9b7468c75cb65cde1d23043553c346c6d
Fixed
f2c247e9581024d8b3dd44cbe086bf2bebbef42c
Fixed
8f351db6b2367991f0736b2cff082f5de4872113
Fixed
7ab85762274c0fa997f0ef9a2307b2001aae43c4
Fixed
57d332ce8c921d0e340650470bb0c1d707f216ee
Fixed
be1b25005fd0f9d4e78bec6695711ef87ee33398
Fixed
def814b4ba31b563584061d6895d5ff447d5bc14
Fixed
e77fdf9e33a83a08f04ab0cb68c19ddb365a622f
Fixed
ac1c7656fa717f29fac3ea073af63f0b9919ec9a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39987.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.12.0
Fixed
5.4.300
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.245
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.194
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.155
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.109
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.50
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39987.json"