๐Ÿ” CVE Alert

CVE-2025-39853

UNKNOWN 0.0

i40e: Fix potential invalid access when MAC list is empty

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: i40e: Fix potential invalid access when MAC list is empty list_first_entry() never returns NULL - if the list is empty, it still returns a pointer to an invalid object, leading to potential invalid memory access when dereferenced. Fix this by using list_first_entry_or_null instead of list_first_entry.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 19, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e3219ce6a775468368fb270fae3eb82a6787b436 < 971feafe157afac443027acdc235badc6838560b e3219ce6a775468368fb270fae3eb82a6787b436 < 3c6fb929afa313d9d11f780451d113f73922fe5d e3219ce6a775468368fb270fae3eb82a6787b436 < 1eadabcf5623f1237a539b16586b4ed8ac8dffcd e3219ce6a775468368fb270fae3eb82a6787b436 < e2a5e74879f9b494bbd66fa93f355feacde450c7 e3219ce6a775468368fb270fae3eb82a6787b436 < fb216d980fae6561c7c70af8ef826faf059c6515 e3219ce6a775468368fb270fae3eb82a6787b436 < 66e7cdbda74ee823ec2bf7b830ebd235c54f5ddf e3219ce6a775468368fb270fae3eb82a6787b436 < 9c21fc4cebd44dd21016c61261a683af390343f8 e3219ce6a775468368fb270fae3eb82a6787b436 < a556f06338e1d5a85af0e32ecb46e365547f92b9
Linux / Linux
4.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/971feafe157afac443027acdc235badc6838560b git.kernel.org: https://git.kernel.org/stable/c/3c6fb929afa313d9d11f780451d113f73922fe5d git.kernel.org: https://git.kernel.org/stable/c/1eadabcf5623f1237a539b16586b4ed8ac8dffcd git.kernel.org: https://git.kernel.org/stable/c/e2a5e74879f9b494bbd66fa93f355feacde450c7 git.kernel.org: https://git.kernel.org/stable/c/fb216d980fae6561c7c70af8ef826faf059c6515 git.kernel.org: https://git.kernel.org/stable/c/66e7cdbda74ee823ec2bf7b830ebd235c54f5ddf git.kernel.org: https://git.kernel.org/stable/c/9c21fc4cebd44dd21016c61261a683af390343f8 git.kernel.org: https://git.kernel.org/stable/c/a556f06338e1d5a85af0e32ecb46e365547f92b9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-089022.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html