lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025101557-CVE-2025-39973-b1a3@gregkh>
Date: Wed, 15 Oct 2025 09:57:01 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-39973: i40e: add validation for ring_len param

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

i40e: add validation for ring_len param

The `ring_len` parameter provided by the virtual function (VF)
is assigned directly to the hardware memory context (HMC) without
any validation.

To address this, introduce an upper boundary check for both Tx and Rx
queue lengths. The maximum number of descriptors supported by the
hardware is 8k-32.
Additionally, enforce alignment constraints: Tx rings must be a multiple
of 8, and Rx rings must be a multiple of 32.

The Linux kernel CVE team has assigned CVE-2025-39973 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 5.4.300 with commit 0543d40d6513cdf1c7882811086e59a6455dfe97
	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 5.10.245 with commit 7d749e38dd2b7e8a80da2ca30c93e09de95bfcf9
	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 5.15.194 with commit 45a7527cd7da4cdcf3b06b5c0cb1cae30b5a5985
	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 6.1.155 with commit d3b0d3f8d11fa957171fbb186e53998361a88d4e
	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 6.6.109 with commit c0c83f4cd074b75cecef107bfc349be7d516c9c4
	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 6.12.50 with commit 05fe81fb9db20464fa532a3835dc8300d68a2f84
	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 6.16.10 with commit afec12adab55d10708179a64d95d650741e60fe0
	Issue introduced in 3.12 with commit 5c3c48ac6bf56367c4e89f6453cd2d61e50375bd and fixed in 6.17 with commit 55d225670def06b01af2e7a5e0446fbe946289e8

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-39973
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/0543d40d6513cdf1c7882811086e59a6455dfe97
	https://git.kernel.org/stable/c/7d749e38dd2b7e8a80da2ca30c93e09de95bfcf9
	https://git.kernel.org/stable/c/45a7527cd7da4cdcf3b06b5c0cb1cae30b5a5985
	https://git.kernel.org/stable/c/d3b0d3f8d11fa957171fbb186e53998361a88d4e
	https://git.kernel.org/stable/c/c0c83f4cd074b75cecef107bfc349be7d516c9c4
	https://git.kernel.org/stable/c/05fe81fb9db20464fa532a3835dc8300d68a2f84
	https://git.kernel.org/stable/c/afec12adab55d10708179a64d95d650741e60fe0
	https://git.kernel.org/stable/c/55d225670def06b01af2e7a5e0446fbe946289e8

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ