{"id":"CVE-2025-71137","summary":"octeontx2-pf: fix \"UBSAN: shift-out-of-bounds error\"","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: fix \"UBSAN: shift-out-of-bounds error\"\n\nThis patch ensures that the RX ring size (rx_pending) is not\nset below the permitted length. This avoids UBSAN\nshift-out-of-bounds errors when users passes small or zero\nring sizes via ethtool -G.","modified":"2026-03-31T17:29:44.592446Z","published":"2026-01-14T15:07:51.264Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71137.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/442848e457f5a9f71a4e7e14d24d73dae278ebe3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4cc4cfe4d23c883120b6f3d41145edbaa281f2ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d8dfa3abb9a845302e021cf9c92d941abbc011a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/658caf3b8aad65f8b8e102670ca4f68c7030f655"},{"type":"WEB","url":"https://git.kernel.org/stable/c/85f4b0c650d9f9db10bda8d3acfa1af83bf78cf7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aa743b0d98448282b2cb37356db8db2a48524624"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b23a2e15589466a027c9baa3fb5813c9f6a6c6dc"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71137.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71137"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d45d8979840d9c9ac93d3fe8cfc8e794b7228445"},{"fixed":"5d8dfa3abb9a845302e021cf9c92d941abbc011a"},{"fixed":"4cc4cfe4d23c883120b6f3d41145edbaa281f2ab"},{"fixed":"658caf3b8aad65f8b8e102670ca4f68c7030f655"},{"fixed":"b23a2e15589466a027c9baa3fb5813c9f6a6c6dc"},{"fixed":"aa743b0d98448282b2cb37356db8db2a48524624"},{"fixed":"442848e457f5a9f71a4e7e14d24d73dae278ebe3"},{"fixed":"85f4b0c650d9f9db10bda8d3acfa1af83bf78cf7"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71137.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.6.0"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71137.json"}}],"schema_version":"1.7.5"}