{"id":"CVE-2025-38200","summary":"i40e: fix MMIO write access to an invalid page in i40e_clear_hw","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix MMIO write access to an invalid page in i40e_clear_hw\n\nWhen the device sends a specific input, an integer underflow can occur, leading\nto MMIO write access to an invalid page.\n\nPrevent the integer underflow by changing the type of related variables.","modified":"2026-04-16T04:37:22.948484307Z","published":"2025-07-04T13:37:22.076Z","related":["ALSA-2025:14438","ALSA-2025:14510","ALSA-2025:15011","SUSE-SU-2025:02588-1","SUSE-SU-2025:02844-1","SUSE-SU-2025:02844-2","SUSE-SU-2025:02846-1","SUSE-SU-2025:02848-1","SUSE-SU-2025:02849-1","SUSE-SU-2025:02850-1","SUSE-SU-2025:02851-1","SUSE-SU-2025:02852-1","SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38200.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/015bac5daca978448f2671478c553ce1f300c21e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3502dd42f178dae9d54696013386bb52b4f2e655"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e75c9082987479e647c75ec8fdf18fa68263c42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/872607632c658d3739e4e7889e4f3c419ae2c193"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8cde755f56163281ec2c46b4ae8b61f532758a6f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d88a1e8f024ba26e19350958fecbf771a9960352"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fecb2fc3fc10c95724407cc45ea35af4a65cdde2"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38200.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38200"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1bff652941c4d94f97610c9a30473aad6f5b2fff"},{"fixed":"872607632c658d3739e4e7889e4f3c419ae2c193"},{"fixed":"5e75c9082987479e647c75ec8fdf18fa68263c42"},{"fixed":"fecb2fc3fc10c95724407cc45ea35af4a65cdde2"},{"fixed":"d88a1e8f024ba26e19350958fecbf771a9960352"},{"fixed":"8cde755f56163281ec2c46b4ae8b61f532758a6f"},{"fixed":"3502dd42f178dae9d54696013386bb52b4f2e655"},{"fixed":"2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca"},{"fixed":"015bac5daca978448f2671478c553ce1f300c21e"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38200.json"}}],"schema_version":"1.7.5"}