VYPR
Unrated severityNVD Advisory· Published Oct 15, 2025· Updated Apr 15, 2026

CVE-2025-39973

CVE-2025-39973

Description

In the Linux kernel, the following vulnerability has been resolved:

i40e: add validation for ring_len param

The ring_len parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validation.

To address this, introduce an upper boundary check for both Tx and Rx queue lengths. The maximum number of descriptors supported by the hardware is 8k-32. Additionally, enforce alignment constraints: Tx rings must be a multiple of 8, and Rx rings must be a multiple of 32.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's i40e driver, missing validation of the ring_len parameter from VFs allows out-of-bounds HMC writes, leading to memory corruption or denial of service.

Vulnerability

Overview

CVE-2025-39973 describes a missing validation in the Intel i40e network driver for the Linux kernel. The ring_len parameter provided by a virtual function (VF) is assigned directly to the hardware memory context (HMC) without any bounds checking. This can allow a malicious or compromised VF to specify excessive queue lengths, potentially leading to memory corruption or denial of service.

Impact and

Exploitation

An attacker with access to a VF on a system using the i40e driver can set ring_len to values beyond the hardware maximum (8K-32 descriptors) or violate alignment constraints (Tx rings must be multiple of 8, Rx rings multiple of 32). The unchecked assignment to HMC could cause the hardware to access out-of-bounds memory, resulting in system instability or privilege escalation.

Mitigation

The fix introduces upper boundary checks and alignment validation for both Tx and Rx queue lengths. The kernel community has backported the patch to multiple stable branches, as seen in commits [1], [2], [3], and [4]. Users should update to the latest stable kernel version to mitigate the vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.