Home

Description

In the Linux kernel, the following vulnerability has been resolved: dm-stripe: fix a possible integer overflow There's a possible integer overflow in stripe_io_hints if we have too large chunk size. Test if the overflow happened, and if it did, don't set limits->io_min and limits->io_opt;

PUBLISHED Reserved 2025-04-16 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f8f64254bca5ae58f3b679441962bda4c409f659
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ee27658c239b27721397f3e4eb16370b5cce596e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1071d560afb4c245c2076494226df47db5a35708
affected

Default status
affected

6.12.49
unaffected

6.16.9
unaffected

6.17
unaffected

References

git.kernel.org/...c/f8f64254bca5ae58f3b679441962bda4c409f659

git.kernel.org/...c/ee27658c239b27721397f3e4eb16370b5cce596e

git.kernel.org/...c/1071d560afb4c245c2076494226df47db5a35708

cve.org (CVE-2025-39940)

nvd.nist.gov (CVE-2025-39940)

Download JSON