
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-39986 affects the Linux kernel's sun4i_can driver. The vulnerability was disclosed on October 15, 2025, and involves a buffer overflow issue in the CAN (Controller Area Network) framework. The vulnerability exists because the sun4i_can driver does not properly populate its ndo_change_mtu() function, allowing potential buffer overflow conditions (NVD).
The vulnerability stems from the sun4i_can driver's failure to properly handle MTU configurations. An attacker can bypass the CAN framework logic by sending a PF_PACKET and directly accessing the xmit() function. The PF_PACKET framework only verifies that skb->len matches the interface's MTU. Due to the unpopulated net_device_ops->ndo_change_mtu(), attackers can set invalid MTU values (e.g., 'ip link set can0 mtu 9999'). This allows injection of malicious CAN XL frames through a PF_PACKET socket using ETH_P_CANXL protocol. The vulnerability leads to buffer overflow when the driver misinterprets CAN XL frames as CAN frames, potentially overflowing by up to 247 bytes (NVD).
The vulnerability allows attackers to cause buffer overflow conditions in the Linux kernel's CAN driver implementation. This could potentially lead to memory corruption and arbitrary code execution within the kernel context. The issue affects systems using the sun4i_can driver for CAN bus communications (NVD).
The vulnerability has been addressed by populating the net_device_ops->ndo_change_mtu() function to ensure that the interface's MTU cannot be set to values larger than CAN_MTU. This fix prevents the buffer overflow condition by addressing the root cause of the vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."