CVE-2025-21775
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's ctucanfd CAN bus driver could cause kernel crashes or system instability when skb allocation fails. This affects systems using the ctucanfd driver for CAN bus communication, primarily embedded Linux devices and automotive systems. The vulnerability requires local access or ability to trigger CAN bus error conditions.
💻 Affected Systems
- Linux kernel with ctucanfd driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially causing safety issues in automotive or industrial control systems.
Likely Case
System instability or kernel crash requiring reboot, causing temporary denial of service.
If Mitigated
Minimal impact with proper access controls and monitoring in place.
🎯 Exploit Status
Requires ability to trigger CAN bus error conditions or control skb allocation failures through other means.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel stable releases containing commits: 84b9ac59978a6a4e0812d1c938fad97306272cef, 9bd24927e3eeb85642c7baa3b28be8bea6c2a078, b0e592dd46a0a952b41c3bf6c963afdd6a42b526, e505b83b9ee6aa0ae2f4395f573a66579ae403fb, e7e2e2318b1f085044126ba553a4e619842fc36d
Vendor Advisory: https://git.kernel.org/stable/c/84b9ac59978a6a4e0812d1c938fad97306272cef
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from official distribution repositories. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable ctucanfd driver
linuxUnload or blacklist the vulnerable ctucanfd driver if CAN bus functionality is not required.
modprobe -r ctucanfd
echo 'blacklist ctucanfd' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Restrict access to CAN bus interfaces and system users who can trigger CAN error conditions.
- Implement monitoring for kernel crashes and system instability related to CAN bus operations.
🔍 How to Verify
Check if Vulnerable:
Check if ctucanfd driver is loaded: lsmod | grep ctucanfd. Check kernel version against patched releases.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and ctucanfd driver version includes the NULL check fix.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference errors in kernel logs
- System crash reports related to CAN bus
Network Indicators:
- Unusual CAN bus traffic patterns triggering error conditions
SIEM Query:
source="kernel" AND ("NULL pointer" OR "kernel panic" OR "ctucanfd")
🔗 References
- https://git.kernel.org/stable/c/84b9ac59978a6a4e0812d1c938fad97306272cef
- https://git.kernel.org/stable/c/9bd24927e3eeb85642c7baa3b28be8bea6c2a078
- https://git.kernel.org/stable/c/b0e592dd46a0a952b41c3bf6c963afdd6a42b526
- https://git.kernel.org/stable/c/e505b83b9ee6aa0ae2f4395f573a66579ae403fb
- https://git.kernel.org/stable/c/e7e2e2318b1f085044126ba553a4e619842fc36d
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html