-

CVE-2025-39973

In the Linux kernel, the following vulnerability has been resolved:

i40e: add validation for ring_len param

The `ring_len` parameter provided by the virtual function (VF)
is assigned directly to the hardware memory context (HMC) without
any validation.

To address this, introduce an upper boundary check for both Tx and Rx
queue lengths. The maximum number of descriptors supported by the
hardware is 8k-32.
Additionally, enforce alignment constraints: Tx rings must be a multiple
of 8, and Rx rings must be a multiple of 32.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 0543d40d6513cdf1c7882811086e59a6455dfe97
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
Version < 7d749e38dd2b7e8a80da2ca30c93e09de95bfcf9
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
Version < 45a7527cd7da4cdcf3b06b5c0cb1cae30b5a5985
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
Version < d3b0d3f8d11fa957171fbb186e53998361a88d4e
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
Version < c0c83f4cd074b75cecef107bfc349be7d516c9c4
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
Version < 05fe81fb9db20464fa532a3835dc8300d68a2f84
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
Version < afec12adab55d10708179a64d95d650741e60fe0
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
Version < 55d225670def06b01af2e7a5e0446fbe946289e8
Version 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.12
Status affected
Version < 3.12
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.300
Status unaffected
Version <= 5.10.*
Version 5.10.245
Status unaffected
Version <= 5.15.*
Version 5.15.194
Status unaffected
Version <= 6.1.*
Version 6.1.155
Status unaffected
Version <= 6.6.*
Version 6.6.109
Status unaffected
Version <= 6.12.*
Version 6.12.50
Status unaffected
Version <= 6.16.*
Version 6.16.10
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.159
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String