CVE-2025-39969
Description
In the Linux kernel, the following vulnerability has been resolved:
i40e: fix validation of VF state in get resources
VF state I40E_VF_STATE_ACTIVE is not the only state in which VF is actually active so it should not be used to determine if a VF is allowed to obtain resources.
Use I40E_VF_STATE_RESOURCES_LOADED that is set only in i40e_vc_get_vf_resources_msg() and cleared during reset.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The vulnerability resides in the i40e driver for Intel Ethernet adapters. The function responsible for handling VF resource requests (i40e_vc_get_vf_resources_msg()) incorrectly used the I40E_VF_STATE_ACTIVE flag to determine if a VF is allowed to obtain resources. However, this flag is not a reliable indicator of VF readiness, as a VF can be active but not yet fully initialized or in the middle of a reset. This flaw could allow a VF that is not fully operational to request and receive resources, potentially leading to resource exhaustion or denial of service for other VFs or the PF.
An attacker with access to a VF on the same physical adapter could exploit this by sending a resource request while the VF is in a state where it should not be granted resources. The attack does not require any special privileges beyond normal VF privileges but leverages the incorrect state check to bypass the intended resource allocation policy. The prerequisite is that the attacker controls a VF is able to interact with the PF via the virtual channel.
The impact is that a malicious or misconfigured VF could consume resources that should be reserved for properly initialized VFs, leading to denial of service for other VFs or the PF. In worst-case scenarios, this could cause the PF to crash or become unresponsive, affecting all VFs on the adapter.
The fix, applied to the Linux kernel stable branches, replaces the check for I40E_VF_STATE_ACTIVE with I40E_VF_STATE_RESOURCES_LOADED. This flag is set only when the VF has successfully completed resource loading and is cleared during reset, ensuring that only fully ready VFs can obtain resources. Users should update their kernel to include the patch commit [1][2][3] to mitigate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8185745d56ec9f47876788a238e35c80f85706c3981fd59efe748f1ee493f6128bbc7adc2a991dc56d3e9877b7e6ffc23Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/185745d56ec958bf8aa773828213237dfcc32f5anvd
- git.kernel.org/stable/c/6128bbc7adc25c87c2f64b5eb66a280b78ef7ab7nvd
- git.kernel.org/stable/c/6c3981fd59ef11a75005ac9978f034da5a168b6anvd
- git.kernel.org/stable/c/877b7e6ffc23766448236e8732254534c518ba42nvd
- git.kernel.org/stable/c/8e35c80f8570426fe0f0cc92b151ebd835975f22nvd
- git.kernel.org/stable/c/a991dc56d3e9a2c3db87d0c3f03c24f6595400f1nvd
- git.kernel.org/stable/c/e748f1ee493f88e38b77363a60499f979d42c58anvd
- git.kernel.org/stable/c/f47876788a23de296c42ef9d505b5c1630f0b4b8nvd
News mentions
0No linked articles in our index yet.