CVE-2025-39853
Description
In the Linux kernel, the following vulnerability has been resolved:
i40e: Fix potential invalid access when MAC list is empty
list_first_entry() never returns NULL - if the list is empty, it still returns a pointer to an invalid object, leading to potential invalid memory access when dereferenced.
Fix this by using list_first_entry_or_null instead of list_first_entry.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's i40e driver, using list_first_entry() on an empty MAC list can cause invalid memory access; fixed by using list_first_entry_or_null.
Vulnerability
CVE-2025-39853 is a bug in the Linux kernel's i40e network driver. The root cause is the use of list_first_entry() on a MAC address list that may be empty. Unlike list_first_entry_or_null(), list_first_entry() does not return NULL for an empty list; it returns a pointer to an invalid object, leading to potential invalid memory access when that pointer is dereferenced [1][2].
Exploitation
An attacker with local access or the ability to trigger the vulnerable code path (e.g., by manipulating network configuration) could cause the driver to dereference a dangling pointer. No special privileges beyond those needed to interact with the i40e driver are required, but the attack surface is limited to systems using the affected Intel Ethernet Controller XL710 (i40e) driver.
Impact
Successful exploitation could result in a denial of service (system crash) or, in some cases, arbitrary code execution in kernel context, depending on memory layout and the memory layout. The CVSS v3 base score is 7.1 (High), indicating significant potential for confidentiality, integrity, and availability impact [1].
Mitigation
The fix has been applied in the Linux kernel stable tree, replacing list_first_entry() with list_first_entry_or_null() [3][4]. Users should update to a patched kernel version. Siemens has also listed this CVE as affecting SIMATIC CN 4100 devices (all versions < V5.0) and recommends updating to V5.0 or later [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 4.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- git.kernel.org/stable/c/1eadabcf5623f1237a539b16586b4ed8ac8dffcdnvdPatch
- git.kernel.org/stable/c/3c6fb929afa313d9d11f780451d113f73922fe5dnvdPatch
- git.kernel.org/stable/c/66e7cdbda74ee823ec2bf7b830ebd235c54f5ddfnvdPatch
- git.kernel.org/stable/c/971feafe157afac443027acdc235badc6838560bnvdPatch
- git.kernel.org/stable/c/9c21fc4cebd44dd21016c61261a683af390343f8nvdPatch
- git.kernel.org/stable/c/a556f06338e1d5a85af0e32ecb46e365547f92b9nvdPatch
- git.kernel.org/stable/c/e2a5e74879f9b494bbd66fa93f355feacde450c7nvdPatch
- git.kernel.org/stable/c/fb216d980fae6561c7c70af8ef826faf059c6515nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlnvdMailing ListThird Party Advisory
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdMailing ListThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-089022.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories