CVE-2025-39972
Description
In the Linux kernel, the following vulnerability has been resolved:
i40e: fix idx validation in i40e_validate_queue_map
Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_validate_queue_map().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's i40e driver, a missing index validation in i40e_validate_queue_map can lead to out-of-bounds access when iterating traffic class channels.
Vulnerability
Overview
CVE-2025-39972 is a flaw in the Linux kernel's i40e network driver, specifically in the i40e_validate_queue_map() function. The function iterates over vf->ch[idx] without ensuring that idx is within the bounds of the active or initialized traffic classes (TCs). This missing validation can cause the driver to access memory outside the intended array, leading to undefined behavior.
Attack
Vector and Prerequisites
Exploitation of this vulnerability requires local access to the system, as the function is invoked during the configuration of virtual functions (VFs) in the i40e driver. An attacker with the ability to set up VFs or influence their queue mapping could trigger the out-of-bounds access. No authentication is needed beyond the ability to interact with the VF setup, but physical or logical local access is necessary [1][2][3].
Impact
Successful exploitation could result in a denial of service (system crash or kernel panic) or potentially memory corruption, depending on the specific out-of-bounds read/write. The impact is primarily limited to system stability, as the driver runs in kernel space.
Mitigation
The fix has been applied in the upstream Linux kernel stable branches. Administrators should update their kernel to include the commit that adds the proper bounds check. No workaround is available without the patch [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8b6cb93a7ff206f15a7b34fae34dfac0c90484d5e804a9e1950a1e2f50f6ccc4191e8ef40d4e3eaaa3cb3aa68d3c3ac8dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/34dfac0c904829967d500c51f216916ce1452957nvd
- git.kernel.org/stable/c/4d5e804a9e19b639b18fd13664dbad3c03c79e61nvd
- git.kernel.org/stable/c/50a1e2f50f6c22b93b94eb8d168a1be3c05bf5cdnvd
- git.kernel.org/stable/c/6f15a7b34fae75e745bdc2ec05e06ddfd0dd2f3cnvd
- git.kernel.org/stable/c/aa68d3c3ac8d1dcec40d52ae27e39f6d32207009nvd
- git.kernel.org/stable/c/b6cb93a7ff208f324c7ec581d72995f80e115e0envd
- git.kernel.org/stable/c/cc4191e8ef40d2249c1b9a8617d22ec8a976b574nvd
- git.kernel.org/stable/c/d4e3eaaa3cb3af77836d806c89cd6ebf533a7320nvd
News mentions
0No linked articles in our index yet.