CVE-2025-39973 Affecting kernel-uek-modules-deprecated package, versions <0:6.12.0-104.43.4.3.el9uek


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE9-KERNELUEKMODULESDEPRECATED-13710228
  • published25 Oct 2025
  • disclosed15 Oct 2025

Introduced: 15 Oct 2025

NewCVE-2025-39973  (opens in a new tab)

How to fix?

Upgrade Oracle:9 kernel-uek-modules-deprecated to version 0:6.12.0-104.43.4.3.el9uek or higher.
This issue was patched in ELSA-2025-20719.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-modules-deprecated package and not the kernel-uek-modules-deprecated package as distributed by Oracle. See How to fix? for Oracle:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

i40e: add validation for ring_len param

The ring_len parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validation.

To address this, introduce an upper boundary check for both Tx and Rx queue lengths. The maximum number of descriptors supported by the hardware is 8k-32. Additionally, enforce alignment constraints: Tx rings must be a multiple of 8, and Rx rings must be a multiple of 32.

CVSS Base Scores

version 3.1