0.0
NA
CVE-2025-39971
i40e: fix idx validation in config queues msg
Description

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

INFO

Published Date :

Oct. 15, 2025, 8:15 a.m.

Last Modified :

Oct. 16, 2025, 3:29 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2025-39971 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Update the Linux kernel to the latest version to fix queue configuration issues.
  • Update the Linux kernel to the latest stable release.
  • Apply the provided patch for the i40e driver.
  • Recompile and install the kernel if necessary.
  • Reboot the system after updating.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-39971 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-39971 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-39971 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-39971 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Oct. 15, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().
    Added Reference https://git.kernel.org/stable/c/1fa0aadade34481c567cdf4a897c0d4e4d548bd1
    Added Reference https://git.kernel.org/stable/c/2cc26dac0518d2fa9b67ec813ee60e183480f98a
    Added Reference https://git.kernel.org/stable/c/5c1f96123113e0bdc6d8dc2b0830184c93da9f65
    Added Reference https://git.kernel.org/stable/c/8b9c7719b0987b1c6c5fc910599f3618a558dbde
    Added Reference https://git.kernel.org/stable/c/a6ff2af78343eceb0f77ab1a2fe802183bc21648
    Added Reference https://git.kernel.org/stable/c/bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b
    Added Reference https://git.kernel.org/stable/c/f1ad24c5abe1eaef69158bac1405a74b3c365115
    Added Reference https://git.kernel.org/stable/c/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.