CVE-2025-40020
Description
In the Linux kernel, the following vulnerability has been resolved:
can: peak_usb: fix shift-out-of-bounds issue
Explicitly uses a 64-bit constant when the number of bits used for its shifting is 32 (which is the case for PC CAN FD interfaces supported by this driver).
[mkl: update subject, apply manually]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A shift-out-of-bounds bug in the Linux kernel's peak_usb CAN driver can cause undefined behavior when shifting a 32-bit value by 32 bits.
Vulnerability
In the Linux kernel's peak_usb CAN driver, a shift-out-of-bounds vulnerability exists when the driver performs a bit shift operation using a 32-bit constant. When the number of bits to shift is 32 (as is the case for PC CAN FD interfaces supported by this driver), the shift exceeds the width of the type, leading to undefined behavior [1].
Exploitation
This bug is triggered during normal operation of the driver when handling CAN FD interfaces are used. No special privileges or authentication are required beyond the ability to interact with the CAN subsystem, which may be accessible to local users or through certain system configurations. The shift operation occurs in the driver's internal logic, and an attacker with local access could potentially exploit this to cause a system crash or other unpredictable behavior.
Impact
An attacker exploiting this vulnerability could cause a denial of service (system crash) or potentially escalate privileges if the undefined behavior leads to memory corruption. The impact is limited to systems using the affected peak_usb driver with PC CAN FD interfaces.
Mitigation
The fix explicitly uses a 64-bit constant for the shift operation, ensuring the shift amount is always within bounds [1]. The patch has been applied to the Linux kernel stable tree. Users should update to a kernel version containing this fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8572c6568027861b1dd4c614948822a59ecc4176c81cbf9c417edec1830e4eb79ed970670394c58017e5fc443be70aaeeVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/176c81cbf9c4e348610a421aad800087c0401f60nvd
- git.kernel.org/stable/c/17edec1830e48c0becd61642d0e40bc753243b16nvd
- git.kernel.org/stable/c/394c58017e5f41043584c345106cae16a4613710nvd
- git.kernel.org/stable/c/48822a59ecc47d353400d38b1941d3ae7591ffffnvd
- git.kernel.org/stable/c/572c656802781cc57f4a3231eefa83547e75ed78nvd
- git.kernel.org/stable/c/61b1dd4c614935169d12bdecc26906e37b508618nvd
- git.kernel.org/stable/c/c443be70aaee42c2d1d251e0329e0a69dd96ae54nvd
- git.kernel.org/stable/c/eb79ed970670344380e77d62f8188e8015648d94nvd
News mentions
0No linked articles in our index yet.