CVE-2025-39810
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.4 (inc) to 6.12.45 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.16.5 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's bnxt_en driver where a function called bnxt_set_dflt_rings() incorrectly assumes it is always called before any traffic classes (TC) are created, meaning it assumes the number of TCs (bp->num_tc) is 0 or 1. However, when firmware (FW) resources or capabilities change, the driver reinitializes and bp->num_tc can be greater than 1. This causes the driver to allocate too small a size for the transmit (TX) rings, leading to memory corruption during ring allocation. The fix involves properly scaling the TX rings based on the actual number of TCs and adding helper functions to correctly determine the number of TX rings.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption in the Linux kernel network driver, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service by exploiting the corrupted memory.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the Linux kernel version that includes the fix for the bnxt_en driver memory corruption issue. Specifically, ensure that the driver properly handles the number of traffic classes (bp->num_tc) when setting default TX rings to prevent memory corruption. Until the update is applied, avoid scenarios that trigger firmware resource or capability changes that cause driver reinitialization.