lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025101555-CVE-2025-39968-ca60@gregkh>
Date: Wed, 15 Oct 2025 09:56:56 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-39968: i40e: add max boundary check for VF filters

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

i40e: add max boundary check for VF filters

There is no check for max filters that VF can request. Add it.

The Linux kernel CVE team has assigned CVE-2025-39968 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 5.4.300 with commit 9176e18681cb0d34c5acc87bda224f5652af2ab8
	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 5.10.245 with commit e490d8c5a54e0dd1ab22417d72c3a7319cf0f030
	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 5.15.194 with commit 77a35be582dff4c80442ebcdce24d45eed8a6ce4
	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.1.155 with commit 02aae5fcdd34c3a55a243d80a1b328a35852a35c
	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.6.109 with commit edecce7abd7152b48e279b4fa0a883d1839bb577
	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.12.50 with commit d33e5d6631ac4fddda235a7815babc9d3f124299
	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.16.10 with commit 8b13df5aa877b9e4541e301a58a84c42d84d2d9a
	Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.17 with commit cb79fa7118c150c3c76a327894bb2eb878c02619

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-39968
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/9176e18681cb0d34c5acc87bda224f5652af2ab8
	https://git.kernel.org/stable/c/e490d8c5a54e0dd1ab22417d72c3a7319cf0f030
	https://git.kernel.org/stable/c/77a35be582dff4c80442ebcdce24d45eed8a6ce4
	https://git.kernel.org/stable/c/02aae5fcdd34c3a55a243d80a1b328a35852a35c
	https://git.kernel.org/stable/c/edecce7abd7152b48e279b4fa0a883d1839bb577
	https://git.kernel.org/stable/c/d33e5d6631ac4fddda235a7815babc9d3f124299
	https://git.kernel.org/stable/c/8b13df5aa877b9e4541e301a58a84c42d84d2d9a
	https://git.kernel.org/stable/c/cb79fa7118c150c3c76a327894bb2eb878c02619

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ