CVE-2025-39971
Description
In the Linux kernel, the following vulnerability has been resolved:
i40e: fix idx validation in config queues msg
Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's i40e driver, a missing bounds check on the TC index in i40e_vc_config_queues_msg() can lead to out-of-bounds access.
Vulnerability
CVE-2025-39971 is a vulnerability in the Linux kernel's i40e network driver. The issue resides in the i40e_vc_config_queues_msg() function, which handles a virtual channel message from a Virtual Function (VF) to configure its queues. The function iterating index idx over the vf->ch[] array was not validated to ensure it stays within the range of active or initialized Traffic Classes (TCs). This missing bounds check can lead to an out-of-bounds array access [1].
Exploitation
An attacker with the ability to send crafted virtual channel messages from a VF to the Physical Function (PF) driver can trigger this vulnerability. The VF must be able to specify a TC index that exceeds the number of initialized TCs. No special privileges beyond VF access are required, and the attack can be performed from within a guest VM using the i40e VF driver.
Impact
Successful exploitation could cause a denial of service (system crash or memory corruption) due to the out-of-bounds access. In some cases, it might lead to information disclosure or potentially aiding further attacks. The vulnerability does not require authentication from the VF perspective, as the VF driver is trusted model is not involved.
Mitigation
The fix was applied in the Linux kernel stable tree, with commits backported to various stable versions [2][3]. Users should update to a patched kernel version. No workaround is available other than applying the kernel patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8f5f91d164af21fa0aadade348b9c7719b0982cc26dac0518bfcc1dff429d5c1f96123113f1ad24c5abe1a6ff2af78343Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/1fa0aadade34481c567cdf4a897c0d4e4d548bd1nvd
- git.kernel.org/stable/c/2cc26dac0518d2fa9b67ec813ee60e183480f98anvd
- git.kernel.org/stable/c/5c1f96123113e0bdc6d8dc2b0830184c93da9f65nvd
- git.kernel.org/stable/c/8b9c7719b0987b1c6c5fc910599f3618a558dbdenvd
- git.kernel.org/stable/c/a6ff2af78343eceb0f77ab1a2fe802183bc21648nvd
- git.kernel.org/stable/c/bfcc1dff429d4b99ba03e40ddacc68ea4be2b32bnvd
- git.kernel.org/stable/c/f1ad24c5abe1eaef69158bac1405a74b3c365115nvd
- git.kernel.org/stable/c/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2nvd
News mentions
0No linked articles in our index yet.