CVE-2025-39769
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a lockdep warning in the Linux kernel's bnxt_en driver during module removal (rmmod). The issue arises because a lock assertion (netdev_assert_locked()) is triggered incorrectly when the network device is already unregistered during the removal process. The fix changes the assertion to netdev_assert_locked_or_invisible(), which does not assert if the device is unregistered, preventing the warning and ensuring proper lock handling.
How can this vulnerability impact me? :
The vulnerability causes a lockdep warning during the removal of the bnxt_en kernel module, which could lead to instability or unexpected behavior in the kernel module unloading process. While it is primarily a warning about improper lock usage, it may affect system stability or debugging processes related to the bnxt_en driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for lockdep warnings related to the bnxt_en module, specifically messages like 'bnxt_free_ntp_fltrs' warnings during module removal (rmmod). You can check the kernel log using commands such as 'dmesg | grep bnxt_free_ntp_fltrs' or 'journalctl -k | grep bnxt_free_ntp_fltrs' to identify if the warning appears.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the bnxt_en module has been fixed to call netdev_assert_locked_or_invisible() instead of netdev_assert_locked() in bnxt_free_ntp_fltrs(). Until the update is applied, avoid removing the bnxt_en module (rmmod) to prevent triggering the lockdep warning and potential instability.