We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22003

can: ucan: fix out of bound read in strscpy() source



Description

In the Linux kernel, the following vulnerability has been resolved: can: ucan: fix out of bound read in strscpy() source Commit 7fdaf8966aae ("can: ucan: use strscpy() to instead of strncpy()") unintentionally introduced a one byte out of bound read on strscpy()'s source argument (which is kind of ironic knowing that strscpy() is meant to be a more secure alternative :)). Let's consider below buffers: dest[len + 1]; /* will be NUL terminated */ src[len]; /* may not be NUL terminated */ When doing: strncpy(dest, src, len); dest[len] = '\0'; strncpy() will read up to len bytes from src. On the other hand: strscpy(dest, src, len + 1); will read up to len + 1 bytes from src, that is to say, an out of bound read of one byte will occur on src if it is not NUL terminated. Note that the src[len] byte is never copied, but strscpy() still needs to read it to check whether a truncation occurred or not. This exact pattern happened in ucan. The root cause is that the source is not NUL terminated. Instead of doing a copy in a local buffer, directly NUL terminate it as soon as usb_control_msg() returns. With this, the local firmware_str[] variable can be removed. On top of this do a couple refactors: - ucan_ctl_payload->raw is only used for the firmware string, so rename it to ucan_ctl_payload->fw_str and change its type from u8 to char. - ucan_device_request_in() is only used to retrieve the firmware string, so rename it to ucan_get_fw_str() and refactor it to make it directly handle all the string termination logic.

Reserved 2024-12-29 | Published 2025-04-03 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

7fdaf8966aae476deafe11f9a0067ff588615444 before cc29775a8a72d7f3b56cc026796ad99bd65804a7
affected

7fdaf8966aae476deafe11f9a0067ff588615444 before 8cec9e314d3360fc1d8346297c41a6ee45cb45a9
affected

7fdaf8966aae476deafe11f9a0067ff588615444 before a4994161a61bc8fd71d105c579d847cefee99262
affected

7fdaf8966aae476deafe11f9a0067ff588615444 before 1d22a122ffb116c3cf78053e812b8b21f8852ee9
affected

Default status
affected

6.2
affected

Any version before 6.2
unaffected

6.6.85
unaffected

6.12.21
unaffected

6.13.9
unaffected

6.14
unaffected

References

git.kernel.org/...c/cc29775a8a72d7f3b56cc026796ad99bd65804a7

git.kernel.org/...c/8cec9e314d3360fc1d8346297c41a6ee45cb45a9

git.kernel.org/...c/a4994161a61bc8fd71d105c579d847cefee99262

git.kernel.org/...c/1d22a122ffb116c3cf78053e812b8b21f8852ee9

cve.org (CVE-2025-22003)

nvd.nist.gov (CVE-2025-22003)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22003

Support options

Helpdesk Chat, Email, Knowledgebase