VYPR
Unrated severityNVD Advisory· Published Oct 24, 2025· Updated Apr 15, 2026

CVE-2025-40020

CVE-2025-40020

Description

In the Linux kernel, the following vulnerability has been resolved:

can: peak_usb: fix shift-out-of-bounds issue

Explicitly uses a 64-bit constant when the number of bits used for its shifting is 32 (which is the case for PC CAN FD interfaces supported by this driver).

[mkl: update subject, apply manually]

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A shift-out-of-bounds bug in the Linux kernel's peak_usb CAN driver can cause undefined behavior when shifting a 32-bit value by 32 bits.

Vulnerability

In the Linux kernel's peak_usb CAN driver, a shift-out-of-bounds vulnerability exists when the driver performs a bit shift operation using a 32-bit constant. When the number of bits to shift is 32 (as is the case for PC CAN FD interfaces supported by this driver), the shift exceeds the width of the type, leading to undefined behavior [1].

Exploitation

This bug is triggered during normal operation of the driver when handling CAN FD interfaces are used. No special privileges or authentication are required beyond the ability to interact with the CAN subsystem, which may be accessible to local users or through certain system configurations. The shift operation occurs in the driver's internal logic, and an attacker with local access could potentially exploit this to cause a system crash or other unpredictable behavior.

Impact

An attacker exploiting this vulnerability could cause a denial of service (system crash) or potentially escalate privileges if the undefined behavior leads to memory corruption. The impact is limited to systems using the affected peak_usb driver with PC CAN FD interfaces.

Mitigation

The fix explicitly uses a 64-bit constant for the shift operation, ensuring the shift amount is always within bounds [1]. The patch has been applied to the Linux kernel stable tree. Users should update to a kernel version containing this fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.