#VU117655 Out-of-bounds read in Linux kernel - CVE-2025-40020
Published: October 26, 2025
Vulnerability identifier: #VU117655
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-40020
CWE-ID: CWE-125
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the peak_usb_update_ts_now() function in drivers/net/can/usb/peak_usb/pcan_usb_core.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's repository.
External links
- https://git.kernel.org/stable/c/176c81cbf9c4e348610a421aad800087c0401f60
- https://git.kernel.org/stable/c/17edec1830e48c0becd61642d0e40bc753243b16
- https://git.kernel.org/stable/c/394c58017e5f41043584c345106cae16a4613710
- https://git.kernel.org/stable/c/48822a59ecc47d353400d38b1941d3ae7591ffff
- https://git.kernel.org/stable/c/572c656802781cc57f4a3231eefa83547e75ed78
- https://git.kernel.org/stable/c/61b1dd4c614935169d12bdecc26906e37b508618
- https://git.kernel.org/stable/c/c443be70aaee42c2d1d251e0329e0a69dd96ae54
- https://git.kernel.org/stable/c/eb79ed970670344380e77d62f8188e8015648d94