CVE-2025-68770
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bnxt | bnxt_en | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's bnxt_en driver related to the XDP_TX path. The issue is that event flags are not correctly cleared in the bnxt_rx_xdp() function. Specifically, if the BNXT_TX_EVENT flag is set indicating pending XDP_TX packets, it may be cleared incorrectly if the TX ring has no more room, causing the driver to miss notifying the hardware (TX doorbell). This leads to the RX ring becoming empty and packets being dropped because the driver stops refilling the RX ring, thinking TX packets are still pending. The fix involves only clearing the BNXT_RX_EVENT flag after successfully transmitting XDP packets.
How can this vulnerability impact me? :
This vulnerability can cause packet loss because the RX ring associated with the TX XDP ring will eventually become empty and all incoming packets will be dropped. This happens because the driver incorrectly manages event flags, leading to a situation where it stops refilling the RX ring, resulting in network communication disruption.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in the Linux kernel by correcting the handling of event flags in the bnxt_en driver for XDP_TX actions. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for the bnxt_en driver as described. This will ensure proper clearing and setting of event flags, preventing packet drops caused by the TX ring being full and the RX ring becoming empty.