๐Ÿ” CVE Alert

CVE-2025-39810

HIGH 7.8

bnxt_en: Fix memory corruption when FW resources change during ifdown

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix memory corruption when FW resources change during ifdown bnxt_set_dflt_rings() assumes that it is always called before any TC has been created. So it doesn't take bp->num_tc into account and assumes that it is always 0 or 1. In the FW resource or capability change scenario, the FW will return flags in bnxt_hwrm_if_change() that will cause the driver to reinitialize and call bnxt_cancel_reservations(). This will lead to bnxt_init_dflt_ring_mode() calling bnxt_set_dflt_rings() and bp->num_tc may be greater than 1. This will cause bp->tx_ring[] to be sized too small and cause memory corruption in bnxt_alloc_cp_rings(). Fix it by properly scaling the TX rings by bp->num_tc in the code paths mentioned above. Add 2 helper functions to determine bp->tx_nr_rings and bp->tx_nr_rings_per_tc.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ec5d31e3c15d5233b491400133c67f78a320062c < d00e98977ef519280b075d783653e2c492fffbb6 ec5d31e3c15d5233b491400133c67f78a320062c < 9ab6a9950f152e094395d2e3967f889857daa185 ec5d31e3c15d5233b491400133c67f78a320062c < 2747328ba2714f1a7454208dbbc1dc0631990b4a
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d00e98977ef519280b075d783653e2c492fffbb6 git.kernel.org: https://git.kernel.org/stable/c/9ab6a9950f152e094395d2e3967f889857daa185 git.kernel.org: https://git.kernel.org/stable/c/2747328ba2714f1a7454208dbbc1dc0631990b4a