In the Linux kernel, the following vulnerability has been resolved:
dm-stripe: fix a possible integer overflow
There's a possible integer overflow in stripeiohints if we have too large chunk size. Test if the overflow happened, and if it did, don't set limits->iomin and limits->ioopt;
[
{
"id": "CVE-2025-39940-2217f8db",
"target": {
"file": "drivers/md/dm-stripe.c",
"function": "stripe_io_hints"
},
"digest": {
"function_hash": "33146986307768225098161641935509574809",
"length": 245.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f8f64254bca5ae58f3b679441962bda4c409f659",
"signature_version": "v1"
},
{
"id": "CVE-2025-39940-3ce5d563",
"target": {
"file": "drivers/md/dm-stripe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"232335884039699058608389073915285741976",
"102372871257010003717761462030833345845",
"255166625306130001350711149102064029632",
"48360397590786835046128961611118255606",
"107195659588310892215192140931489747501",
"243213835036716925574701083465522362761",
"315283514463993161422181092454881084634"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ee27658c239b27721397f3e4eb16370b5cce596e",
"signature_version": "v1"
},
{
"id": "CVE-2025-39940-42d613f2",
"target": {
"file": "drivers/md/dm-stripe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"232335884039699058608389073915285741976",
"102372871257010003717761462030833345845",
"255166625306130001350711149102064029632",
"48360397590786835046128961611118255606",
"107195659588310892215192140931489747501",
"243213835036716925574701083465522362761",
"315283514463993161422181092454881084634"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1071d560afb4c245c2076494226df47db5a35708",
"signature_version": "v1"
},
{
"id": "CVE-2025-39940-5113e24c",
"target": {
"file": "drivers/md/dm-stripe.c",
"function": "stripe_io_hints"
},
"digest": {
"function_hash": "33146986307768225098161641935509574809",
"length": 245.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ee27658c239b27721397f3e4eb16370b5cce596e",
"signature_version": "v1"
},
{
"id": "CVE-2025-39940-db99c052",
"target": {
"file": "drivers/md/dm-stripe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"232335884039699058608389073915285741976",
"102372871257010003717761462030833345845",
"255166625306130001350711149102064029632",
"48360397590786835046128961611118255606",
"107195659588310892215192140931489747501",
"243213835036716925574701083465522362761",
"315283514463993161422181092454881084634"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f8f64254bca5ae58f3b679441962bda4c409f659",
"signature_version": "v1"
},
{
"id": "CVE-2025-39940-fb88c3bb",
"target": {
"file": "drivers/md/dm-stripe.c",
"function": "stripe_io_hints"
},
"digest": {
"function_hash": "33146986307768225098161641935509574809",
"length": 245.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1071d560afb4c245c2076494226df47db5a35708",
"signature_version": "v1"
}
]