CVE-2025-38665
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/08/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode<br />
<br />
Andrei Lalaev reported a NULL pointer deref when a CAN device is<br />
restarted from Bus Off and the driver does not implement the struct<br />
can_priv::do_set_mode callback.<br />
<br />
There are 2 code path that call struct can_priv::do_set_mode:<br />
- directly by a manual restart from the user space, via<br />
can_changelink()<br />
- delayed automatic restart after bus off (deactivated by default)<br />
<br />
To prevent the NULL pointer deference, refuse a manual restart or<br />
configure the automatic restart delay in can_changelink() and report<br />
the error via extack to user space.<br />
<br />
As an additional safety measure let can_restart() return an error if<br />
can_priv::do_set_mode is not set instead of dereferencing it<br />
unchecked.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.31 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.101 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.41 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0ca816a96fdcf32644c80cbe7a82c7b6ce6ddda5
- https://git.kernel.org/stable/c/6acceb46180f9e160d4f0c56fcaf39ba562822ae
- https://git.kernel.org/stable/c/6bbcf37c5114926c99a1d1e6993a5b35689d2599
- https://git.kernel.org/stable/c/c1f3f9797c1f44a762e6f5f72520b2e520537b52
- https://git.kernel.org/stable/c/cf81a60a973358dea163f6b14062f17831ceb894
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



