VYPR
Unrated severityNVD Advisory· Published Oct 15, 2025· Updated Apr 15, 2026

CVE-2025-39986

CVE-2025-39986

Description

In the Linux kernel, the following vulnerability has been resolved:

can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN driver. The only check which is performed by the PF_PACKET framework is to make sure that skb->len fits the interface's MTU.

Unfortunately, because the sun4i_can driver does not populate its net_device_ops->ndo_change_mtu(), it is possible for an attacker to configure an invalid MTU by doing, for example:

$ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the ETH_P_CANXL protocol:

socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

struct canxl_frame frame = { .flags = 0xff, .len = 2048, };

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to check that the skb is valid, unfortunately under above conditions, the malicious packet is able to go through can_dev_dropped_skb() checks:

1. the skb->protocol is set to ETH_P_CANXL which is valid (the function does not check the actual device capabilities).

  1. the length is a valid CAN XL length.

And so, sun4ican_start_xmit() receives a CAN XL frame which it is not able to correctly handle and will thus misinterpret it as a CAN frame.

This can result in a buffer overflow. The driver will consume cf->len as-is with no further checks on this line:

dlc = cf->len;

Here, cf->len corresponds to the flags field of the CAN XL frame. In our previous example, we set canxl_frame->flags to 0xff. Because the maximum expected length is 8, a buffer overflow of 247 bytes occurs a couple line below when doing:

for (i = 0; i < dlc; i++) writel(cf->data[i], priv->base + (dreg + i * 4));

Populate net_device_ops->ndo_change_mtu() to ensure that the interface's MTU can not be set to anything bigger than CAN_MTU. By fixing the root cause, this prevents the buffer overflow.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing ndo_change_mtu() in sun4i_can driver allows MTU manipulation and CAN XL frame injection, causing a buffer overflow.

Root

Cause

The sun4i_can driver fails to populate net_device_ops->ndo_change_mtu(), allowing an attacker to set the interface MTU to an arbitrarily large value (e.g., 9999) via ip link set can0 mtu 9999. This bypasses the CAN framework's logic and enables the direct injection of CAN XL frames through PF_PACKET sockets, which are misinterpreted as CAN frames by the driver.

Exploitation

An attacker with local network access can open a raw PF_PACKET socket using ETH_P_CANXL and craft a CAN XL frame with a controlled flags field (e.g., 0xff). The driver's sun4ican_start_xmit() function uses the flags field as the data length (dlc) without validation, leading to a buffer overflow when copying data into memory-mapped registers. The maximum expected length is 8, but an attacker can cause a copy of up to 255 bytes, resulting in a 247-byte overflow.

Impact

A successful exploit can cause a buffer overflow that corrupts adjacent memory, potentially leading to a system crash (denial of service) or arbitrary code execution, depending on the kernel memory layout. The vulnerability is triggered before any access control checks on the frame, allowing unprivileged users to compromise the system.

Mitigation

The fix populates ndo_change_mtu() to restrict the MTU to CAN_MTU (16 bytes), preventing the oversized MTU setting and the resulting overflow. Patches have been applied to the stable Linux kernel tree [1]. Users should apply the latest kernel updates to mitigate the vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.