CVE-2025-40252
Description
In the Linux kernel, the following vulnerability has been resolved:
net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using only a zero-length terminator as the stopping condition. If the terminator was missing or malformed, the loop could run past the end of the fixed-size array.
Add an explicit bound check using ARRAY_SIZE() in both loops to prevent a potential out-of-bounds access.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing array-bound check in the QLogic QEDE driver could cause an out-of-bounds read when processing malformed TPA completion entries.
Vulnerability
In the Linux kernel's QLogic QEDE network driver, the functions qede_tpa_cont() and qede_tpa_end() iterate over the cqe->len_list[] array using only a zero-length terminator as the stopping condition. If the terminator is missing or malformed, the loop can read past the end of the fixed-size array, leading to a potential out-of-bounds read [1].
Exploitation
An attacker who can inject or trigger a crafted TPA (Transparent Packet Aggregation) completion entry on the NIC could cause the driver to read beyond the allocated buffer. No special privileges are required beyond the ability to send network traffic that results in such a completion, making the attack surface accessible from the network [1].
Impact
An out-of-bounds read can leak sensitive kernel memory or cause a system crash (denial of service). The vulnerability was discovered by the Linux Verification Center using the SVACE static analysis tool [1].
Mitigation
The fix adds an explicit bound check using ARRAY_SIZE() in both loops, ensuring the iteration stops before exceeding the array bounds. Patched versions are available in the stable kernel trees containing the commits referenced [1]. Users should update their kernel to include the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
6ecbb12caf399a778912b4a53f0923011c126917a9d02182ae441db07f208896f1a2493b5Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/896f1a2493b59beb2b5ccdf990503dbb16cb2256nvd
- git.kernel.org/stable/c/917a9d02182ac8b4f25eb47dc02f3ec679608c24nvd
- git.kernel.org/stable/c/a778912b4a53587ea07d85526d152f85d109cbfenvd
- git.kernel.org/stable/c/e441db07f208184e0466abf44b389a81d70c340envd
- git.kernel.org/stable/c/ecbb12caf399d7cf364b7553ed5aebeaa2f255bcnvd
- git.kernel.org/stable/c/f0923011c1261b33a2ac1de349256d39cb750dd0nvd
News mentions
0No linked articles in our index yet.