[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025101555-CVE-2025-39968-ca60@gregkh>
Date: Wed, 15 Oct 2025 09:56:56 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-39968: i40e: add max boundary check for VF filters
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
i40e: add max boundary check for VF filters
There is no check for max filters that VF can request. Add it.
The Linux kernel CVE team has assigned CVE-2025-39968 to this issue.
Affected and fixed versions
===========================
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 5.4.300 with commit 9176e18681cb0d34c5acc87bda224f5652af2ab8
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 5.10.245 with commit e490d8c5a54e0dd1ab22417d72c3a7319cf0f030
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 5.15.194 with commit 77a35be582dff4c80442ebcdce24d45eed8a6ce4
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.1.155 with commit 02aae5fcdd34c3a55a243d80a1b328a35852a35c
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.6.109 with commit edecce7abd7152b48e279b4fa0a883d1839bb577
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.12.50 with commit d33e5d6631ac4fddda235a7815babc9d3f124299
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.16.10 with commit 8b13df5aa877b9e4541e301a58a84c42d84d2d9a
Issue introduced in 4.17 with commit e284fc280473bed23f2e1ed324e102a48f7d17e1 and fixed in 6.17 with commit cb79fa7118c150c3c76a327894bb2eb878c02619
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-39968
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/9176e18681cb0d34c5acc87bda224f5652af2ab8
https://git.kernel.org/stable/c/e490d8c5a54e0dd1ab22417d72c3a7319cf0f030
https://git.kernel.org/stable/c/77a35be582dff4c80442ebcdce24d45eed8a6ce4
https://git.kernel.org/stable/c/02aae5fcdd34c3a55a243d80a1b328a35852a35c
https://git.kernel.org/stable/c/edecce7abd7152b48e279b4fa0a883d1839bb577
https://git.kernel.org/stable/c/d33e5d6631ac4fddda235a7815babc9d3f124299
https://git.kernel.org/stable/c/8b13df5aa877b9e4541e301a58a84c42d84d2d9a
https://git.kernel.org/stable/c/cb79fa7118c150c3c76a327894bb2eb878c02619
Powered by blists - more mailing lists