Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40330

Опубликовано: 09 дек. 2025
Источник: redhat
CVSS3: 5.2

Описание

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Shutdown FW DMA in bnxt_shutdown() The netif_close() call in bnxt_shutdown() only stops packet DMA. There may be FW DMA for trace logging (recently added) that will continue. If we kexec to a new kernel, the DMA will corrupt memory in the new kernel. Add bnxt_hwrm_func_drv_unrgtr() to unregister the driver from the FW. This will stop the FW DMA. In case the call fails, call pcie_flr() to reset the function and stop the DMA.

A flaw was found in the Linux kernel's Broadcom NetXtreme-C/E (bnxt_en) network driver. During system shutdown via bnxt_shutdown(), only packet DMA is stopped through netif_close(), but firmware DMA operations for trace logging continue. If the system performs a kexec to boot a new kernel, the ongoing firmware DMA writes corrupt memory in the new kernel, potentially leading to system crashes, data corruption, or security vulnerabilities in the newly booted kernel.

Отчет

This vulnerability affects systems using Broadcom NetXtreme-C/E network adapters that perform kexec operations. The memory corruption occurs during the transition to a new kernel, making this particularly relevant for systems that rely on kexec for fast reboots or crash dump collection.

Меры по смягчению последствий

To mitigate this issue, prevent the bnxt_en module from being loaded if Broadcom NetXtreme-C/E network adapters are not required. See https://access.redhat.com/solutions/41278 for instructions on how to blacklist a kernel module.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2420411kernel: bnxt_en: Shutdown FW DMA in bnxt_shutdown()

5.2 Medium

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Shutdown FW DMA in bnxt_shutdown() The netif_close() call in bnxt_shutdown() only stops packet DMA. There may be FW DMA for trace logging (recently added) that will continue. If we kexec to a new kernel, the DMA will corrupt memory in the new kernel. Add bnxt_hwrm_func_drv_unrgtr() to unregister the driver from the FW. This will stop the FW DMA. In case the call fails, call pcie_flr() to reset the function and stop the DMA.

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Shutdown FW DMA in bnxt_shutdown() The netif_close() call in bnxt_shutdown() only stops packet DMA. There may be FW DMA for trace logging (recently added) that will continue. If we kexec to a new kernel, the DMA will corrupt memory in the new kernel. Add bnxt_hwrm_func_drv_unrgtr() to unregister the driver from the FW. This will stop the FW DMA. In case the call fails, call pcie_flr() to reset the function and stop the DMA.

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: b ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Shutdown FW DMA in bnxt_shutdown() The netif_close() call in bnxt_shutdown() only stops packet DMA. There may be FW DMA for trace logging (recently added) that will continue. If we kexec to a new kernel, the DMA will corrupt memory in the new kernel. Add bnxt_hwrm_func_drv_unrgtr() to unregister the driver from the FW. This will stop the FW DMA. In case the call fails, call pcie_flr() to reset the function and stop the DMA.

oracle-oval
около 2 месяцев назад

ELSA-2026-50112: Unbreakable Enterprise kernel security update (IMPORTANT)

5.2 Medium

CVSS3