CVE-2025-39988

Source
https://cve.org/CVERecord?id=CVE-2025-39988
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39988.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39988
Downstream
Related
Published
2025-10-15T07:56:06.601Z
Modified
2026-03-20T12:43:07.853459Z
Summary
can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

can: etases58x: populate ndochange_mtu() to prevent buffer overflow

Sending an PFPACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN driver. The only check which is performed by the PFPACKET framework is to make sure that skb->len fits the interface's MTU.

Unfortunately, because the etases58x driver does not populate its netdeviceops->ndochange_mtu(), it is possible for an attacker to configure an invalid MTU by doing, for example:

$ ip link set can0 mtu 9999

After doing so, the attacker could open a PFPACKET socket using the ETHP_CANXL protocol:

socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL));

to inject a malicious CAN XL frames. For example:

struct canxl_frame frame = {
    .flags = 0xff,
    .len = 2048,
};

The CAN drivers' xmit() function are calling candevdroppedskb() to check that the skb is valid, unfortunately under above conditions, the malicious packet is able to go through candevdroppedskb() checks:

  1. the skb->protocol is set to ETHPCANXL which is valid (the function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, es58xstartxmit() receives a CAN XL frame which it is not able to correctly handle and will thus misinterpret it as a CAN(FD) frame.

This can result in a buffer overflow. For example, using the es581.4 variant, the frame will be dispatched to es5814txcanmsg(), go through the last check at the beginning of this function:

if (can_is_canfd_skb(skb))
    return -EMSGSIZE;

and reach this line:

memcpy(tx_can_msg->data, cf->data, cf->len);

Here, cf->len corresponds to the flags field of the CAN XL frame. In our previous example, we set canxl_frame->flags to 0xff. Because the maximum expected length is 8, a buffer overflow of 247 bytes occurs!

Populate netdeviceops->ndochangemtu() to ensure that the interface's MTU can not be set to anything bigger than CANMTU or CANFDMTU (depending on the device capabilities). By fixing the root cause, this prevents the buffer overflow.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39988.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8537257874e949a59c834cecfd5a063e11b64b0b
Fixed
72de0facc50afdb101fb7197d880407f1abfc77f
Fixed
c4e582e686c4d683c87f2b4a316385b3d81d370f
Fixed
cbc1de71766f326a44bb798aeae4a7ef4a081cc9
Fixed
b26cccd87dcddc47b450a40f3b1ac3fe346efcff
Fixed
e587af2c89ecc6382c518febea52fa9ba81e47c0
Fixed
38c0abad45b190a30d8284a37264d2127a6ec303

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39988.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.15.194
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.155
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.109
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.50
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39988.json"