CVE-2025-38224

7.1 HIGH

📋 TL;DR

This vulnerability in the Linux kernel's Kvaser PCIeFD CAN driver allows out-of-bounds memory access when handling CAN bus acknowledgments. It affects systems using this specific CAN controller driver, potentially leading to kernel crashes or memory corruption. The issue occurs due to improper echo_skb_max handling that causes array boundary violations.

💻 Affected Systems

Products:
  • Linux kernel with kvaser_pciefd driver
Versions: Linux kernel versions containing the vulnerable driver code (specific versions not specified in CVE)
Operating Systems: Linux
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if kvaser_pciefd driver is loaded and active (requires specific Kvaser CAN hardware).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or potential arbitrary code execution leading to full system compromise.

🟠

Likely Case

Kernel crash or system instability when the affected CAN driver processes specific network packets.

🟢

If Mitigated

No impact if the vulnerable driver is not loaded or the system doesn't use Kvaser PCIeFD CAN hardware.

🌐 Internet-Facing: LOW - CAN bus interfaces are typically internal industrial/automotive networks, not internet-facing.
🏢 Internal Only: MEDIUM - Affects industrial control systems, automotive systems, and embedded devices using this specific CAN hardware.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Found by automated fuzzing (Syzkaller), requires sending crafted CAN packets to trigger the out-of-bounds access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in kernel commits: 54ec8b08216f, a6550c9aa11e, d8a054b6e682

Vendor Advisory: https://git.kernel.org/stable/c/54ec8b08216f3be2cc98b33633d3c8ea79749895

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Rebuild kernel if compiling from source. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable kvaser_pciefd driver

linux

Prevent loading of the vulnerable driver module

echo 'blacklist kvaser_pciefd' >> /etc/modprobe.d/blacklist.conf
rmmod kvaser_pciefd

Restrict CAN network access

all

Limit which systems can send CAN packets to vulnerable devices

🧯 If You Can't Patch

  • Isolate CAN networks from untrusted systems
  • Implement strict CAN bus monitoring and anomaly detection

🔍 How to Verify

Check if Vulnerable:

Check if kvaser_pciefd module is loaded: lsmod | grep kvaser_pciefd

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits or verify driver version after update

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN out-of-bounds reports in dmesg
  • CAN driver crash logs

Network Indicators:

  • Unusual CAN packet patterns
  • High rate of CAN acknowledgment packets

SIEM Query:

source="kernel" AND ("KASAN" OR "slab-out-of-bounds" OR "kvaser_pciefd")

🔗 References

📤 Share & Export