VYPR
Unrated severityNVD Advisory· Published Dec 4, 2025· Updated Apr 15, 2026

CVE-2025-40252

CVE-2025-40252

Description

In the Linux kernel, the following vulnerability has been resolved:

net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()

The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using only a zero-length terminator as the stopping condition. If the terminator was missing or malformed, the loop could run past the end of the fixed-size array.

Add an explicit bound check using ARRAY_SIZE() in both loops to prevent a potential out-of-bounds access.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing array-bound check in the QLogic QEDE driver could cause an out-of-bounds read when processing malformed TPA completion entries.

Vulnerability

In the Linux kernel's QLogic QEDE network driver, the functions qede_tpa_cont() and qede_tpa_end() iterate over the cqe->len_list[] array using only a zero-length terminator as the stopping condition. If the terminator is missing or malformed, the loop can read past the end of the fixed-size array, leading to a potential out-of-bounds read [1].

Exploitation

An attacker who can inject or trigger a crafted TPA (Transparent Packet Aggregation) completion entry on the NIC could cause the driver to read beyond the allocated buffer. No special privileges are required beyond the ability to send network traffic that results in such a completion, making the attack surface accessible from the network [1].

Impact

An out-of-bounds read can leak sensitive kernel memory or cause a system crash (denial of service). The vulnerability was discovered by the Linux Verification Center using the SVACE static analysis tool [1].

Mitigation

The fix adds an explicit bound check using ARRAY_SIZE() in both loops, ensuring the iteration stops before exceeding the array bounds. Patched versions are available in the stable kernel trees containing the commits referenced [1]. Users should update their kernel to include the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.