CVE-2025-39873
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's Xilinx CAN driver that occurs when transmitting network packets. It allows attackers with local access to potentially crash the system or execute arbitrary code. Systems using Xilinx CAN hardware with vulnerable kernel versions are affected.
💻 Affected Systems
- Linux kernel with Xilinx CAN driver (xilinx_can)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel-level code execution, leading to complete system compromise.
Likely Case
Kernel panic or system crash causing denial of service.
If Mitigated
No impact if patched or if Xilinx CAN hardware is not used.
🎯 Exploit Status
Requires local access and knowledge of the system. Use-after-free vulnerabilities can be challenging to exploit reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commit 1139321161a3ba5e45e61e0738b37f42f20bc57a and backported to stable branches
Vendor Advisory: https://git.kernel.org/stable/c/1139321161a3ba5e45e61e0738b37f42f20bc57a
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing fix commit 2. Reboot system to load new kernel 3. Verify Xilinx CAN driver is updated
🔧 Temporary Workarounds
Disable Xilinx CAN driver
linuxPrevent loading of the vulnerable driver module
echo 'blacklist xilinx_can' >> /etc/modprobe.d/blacklist.conf
rmmod xilinx_can
🧯 If You Can't Patch
- Disable Xilinx CAN hardware if not required
- Restrict local access to systems using Xilinx CAN hardware
🔍 How to Verify
Check if Vulnerable:
Check if Xilinx CAN driver is loaded: lsmod | grep xilinx_can AND check kernel version against affected versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commit 1139321161a3ba5e45e61e0738b37f42f20bc57a
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crashes/panics related to CAN or network drivers
- Unexpected reboots
Network Indicators:
- Unusual CAN bus traffic patterns
SIEM Query:
source="kernel" AND ("xilinx_can" OR "CAN" OR "use-after-free" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/1139321161a3ba5e45e61e0738b37f42f20bc57a
- https://git.kernel.org/stable/c/668cc1e3bb21101d074e430de1b7ba8fd10189e7
- https://git.kernel.org/stable/c/725b33deebd6e4c96fe7893f384510a54258f28f
- https://git.kernel.org/stable/c/94b050726288a56a6b8ff55aa641f2fedbd3b44c
- https://git.kernel.org/stable/c/e202ffd9e54538ef67ec301ebd6d9da4823466c9
- https://git.kernel.org/stable/c/ef79f00be72bd81d2e1e6f060d83cf7e425deee4
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html