Home

Description

In the Linux kernel, the following vulnerability has been resolved: dm-stripe: fix a possible integer overflow There's a possible integer overflow in stripe_io_hints if we have too large chunk size. Test if the overflow happened, and if it did, don't set limits->io_min and limits->io_opt;

PUBLISHED Reserved 2025-04-16 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before f8f64254bca5ae58f3b679441962bda4c409f659
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ee27658c239b27721397f3e4eb16370b5cce596e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1071d560afb4c245c2076494226df47db5a35708
affected

Default status
affected

6.12.49 (semver)
unaffected

6.16.9 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f8f64254bca5ae58f3b679441962bda4c409f659

git.kernel.org/...c/ee27658c239b27721397f3e4eb16370b5cce596e

git.kernel.org/...c/1071d560afb4c245c2076494226df47db5a35708

cve.org (CVE-2025-39940)

nvd.nist.gov (CVE-2025-39940)

Download JSON