{"id":"CVE-2025-39971","summary":"i40e: fix idx validation in config queues msg","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix idx validation in config queues msg\n\nEnsure idx is within range of active/initialized TCs when iterating over\nvf-\u003ech[idx] in i40e_vc_config_queues_msg().","modified":"2026-04-16T04:32:59.901697653Z","published":"2025-10-15T07:55:54.270Z","related":["ALSA-2025:21917","ALSA-2025:21920","ALSA-2025:22395","SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:21080-1","SUSE-SU-2025:21147-1","SUSE-SU-2025:21180-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4189-1","SUSE-SU-2025:4301-1","openSUSE-SU-2025:20091-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39971.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1fa0aadade34481c567cdf4a897c0d4e4d548bd1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2cc26dac0518d2fa9b67ec813ee60e183480f98a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c1f96123113e0bdc6d8dc2b0830184c93da9f65"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8b9c7719b0987b1c6c5fc910599f3618a558dbde"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6ff2af78343eceb0f77ab1a2fe802183bc21648"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f1ad24c5abe1eaef69158bac1405a74b3c365115"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39971.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39971"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c27eac48160de72dee33d42b5a33cc7b8a2eb1f5"},{"fixed":"a6ff2af78343eceb0f77ab1a2fe802183bc21648"},{"fixed":"f5f91d164af22e7147130ef8bebbdb28d8ecc6e2"},{"fixed":"1fa0aadade34481c567cdf4a897c0d4e4d548bd1"},{"fixed":"8b9c7719b0987b1c6c5fc910599f3618a558dbde"},{"fixed":"2cc26dac0518d2fa9b67ec813ee60e183480f98a"},{"fixed":"bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b"},{"fixed":"5c1f96123113e0bdc6d8dc2b0830184c93da9f65"},{"fixed":"f1ad24c5abe1eaef69158bac1405a74b3c365115"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39971.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.17.0"},{"fixed":"5.4.300"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.245"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.194"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.155"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.109"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.50"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.16.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39971.json"}}],"schema_version":"1.7.5"}