{"id":"CVE-2025-39969","summary":"i40e: fix validation of VF state in get resources","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix validation of VF state in get resources\n\nVF state I40E_VF_STATE_ACTIVE is not the only state in which\nVF is actually active so it should not be used to determine\nif a VF is allowed to obtain resources.\n\nUse I40E_VF_STATE_RESOURCES_LOADED that is set only in\ni40e_vc_get_vf_resources_msg() and cleared during reset.","modified":"2026-04-16T04:36:01.522142953Z","published":"2025-10-15T07:55:52.948Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:21080-1","SUSE-SU-2025:21147-1","SUSE-SU-2025:21180-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4301-1","openSUSE-SU-2025:20091-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39969.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/185745d56ec958bf8aa773828213237dfcc32f5a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6128bbc7adc25c87c2f64b5eb66a280b78ef7ab7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6c3981fd59ef11a75005ac9978f034da5a168b6a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/877b7e6ffc23766448236e8732254534c518ba42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8e35c80f8570426fe0f0cc92b151ebd835975f22"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a991dc56d3e9a2c3db87d0c3f03c24f6595400f1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e748f1ee493f88e38b77363a60499f979d42c58a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f47876788a23de296c42ef9d505b5c1630f0b4b8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39969.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39969"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"171527da84149c2c7aa6a60a64b09d24f3546298"},{"fixed":"185745d56ec958bf8aa773828213237dfcc32f5a"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"eb87117c27e729b0aeef4d72ed40d6a1761b0f68"},{"fixed":"f47876788a23de296c42ef9d505b5c1630f0b4b8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2132643b956f553f5abddc9bae20dae267b082e0"},{"fixed":"8e35c80f8570426fe0f0cc92b151ebd835975f22"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"61125b8be85dfbc7e9c7fe1cc6c6d631ab603516"},{"fixed":"6c3981fd59ef11a75005ac9978f034da5a168b6a"},{"fixed":"e748f1ee493f88e38b77363a60499f979d42c58a"},{"fixed":"6128bbc7adc25c87c2f64b5eb66a280b78ef7ab7"},{"fixed":"a991dc56d3e9a2c3db87d0c3f03c24f6595400f1"},{"fixed":"877b7e6ffc23766448236e8732254534c518ba42"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39969.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.300"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.245"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.194"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.155"},{"fixed":"6.6.109"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.12.50"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.16.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39969.json"}}],"schema_version":"1.7.5"}