CVE-2025-40104
Description
In the Linux kernel, the following vulnerability has been resolved:
ixgbevf: fix mailbox API compatibility by negotiating supported features
There was backward compatibility in the terms of mailbox API. Various drivers from various OSes supporting 10G adapters from Intel portfolio could easily negotiate mailbox API.
This convention has been broken since introducing API 1.4. Commit 0062e7cc955e ("ixgbevf: add VF IPsec offload code") added support for IPSec which is specific only for the kernel ixgbe driver. None of the rest of the Intel 10G PF/VF drivers supports it. And actually lack of support was not included in the IPSec implementation - there were no such code paths. No possibility to negotiate support for the feature was introduced along with introduction of the feature itself.
Commit 339f28964147 ("ixgbevf: Add support for new mailbox communication between PF and VF") increasing API version to 1.5 did the same - it introduced code supported specifically by the PF ESX driver. It altered API version for the VF driver in the same time not touching the version defined for the PF ixgbe driver. It led to additional discrepancies, as the code provided within API 1.6 cannot be supported for Linux ixgbe driver as it causes crashes.
The issue was noticed some time ago and mitigated by Jake within the commit d0725312adf5 ("ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5"). As a result we have regression for IPsec support and after increasing API to version 1.6 ixgbevf driver stopped to support ESX MBX.
To fix this mess add new mailbox op asking PF driver about supported features. Basing on a response determine whether to set support for IPSec and ESX-specific enhanced mailbox.
New mailbox op, for compatibility purposes, must be added within new API revision, as API version of OOT PF & VF drivers is already increased to 1.6 and doesn't incorporate features negotiate op.
Features negotiation mechanism gives possibility to be extended with new features when needed in the future.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux ixgbevf driver, mailbox API versions 1.4-1.6 broke backward compatibility, causing crashes with unsupported PF drivers; a new negotiation op restores compatibility.
The vulnerability resides in the Intel ixgbevf (Virtual Function) driver for 10G Ethernet adapters. Starting with API version 1.4, which added IPSec offload support specific to the Linux ixgbe PF driver, backward compatibility with other PF/VF drivers (e.g., ESX, FreeBSD) was broken. Subsequent API 1.5/1.6 changes introduced ESX-specific mailbox enhancements, further widening the gap and leading to crashes when the VF driver interacted with a PF that did not implement these features. A prior mitigation in commit d0725312adf5 disabled IPSec on API 1.5, causing a regression for IPSec support.
An attacker exploiting this bug would need to be in a position to control either the VF or the PF side of the communication, typically within a virtualized environment where the VF is assigned to a guest VM. No special authentication is required beyond normal network access. The mismatched mailbox versions can cause undefined behavior, including kernel crashes (denial of service). The impact is primarily availability loss, but it also disables IPSec functionality when the mitigation workaround is active.
The fix introduces a new mailbox operation (op) that allows the VF driver to query the PF driver for supported features. Based on the response, the VF driver can selectively enable or disable IPSec and ESX-specific enhanced mailbox features, thereby restoring backward compatibility while preserving functionality where supported. This mechanism is implemented in a new API revision to avoid version conflicts. The fix is backported to stable Linux kernels via commits [1][2][3][4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
5871ac1cd4ce42e0aab9ddaf1bf580112ed61a376e29b1b19a7075f501bd3Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/2e0aab9ddaf1428602c78f12064cd1e6ffcc4d18nvd
- git.kernel.org/stable/c/871ac1cd4ce4804defcb428cbb003fd84c415ff4nvd
- git.kernel.org/stable/c/a376e29b1b196dc90b50df7e5e3947e3026300c4nvd
- git.kernel.org/stable/c/a7075f501bd33c93570af759b6f4302ef0175168nvd
- git.kernel.org/stable/c/bf580112ed61736c2645a893413a04732505d4b1nvd
News mentions
0No linked articles in our index yet.