CVE-2025-21974

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21974
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21974.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-21974
Downstream
Related
Published
2025-04-01T15:47:06Z
Modified
2025-10-15T23:13:00.374388Z
Summary
eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc()
Details

In the Linux kernel, the following vulnerability has been resolved:

eth: bnxt: return fail if interface is down in bnxtqueuemem_alloc()

The bnxtqueuemem_alloc() is called to allocate new queue memory when a queue is restarted. It internally accesses rx buffer descriptor corresponding to the index. The rx buffer descriptor is allocated and set when the interface is up and it's freed when the interface is down. So, if queue is restarted if interface is down, kernel panic occurs.

Splat looks like: BUG: unable to handle page fault for address: 000000000000b240 #PF: supervisor read access in kernel mode #PF: errorcode(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 UID: 0 PID: 1563 Comm: ncdevmem2 Not tainted 6.14.0-rc2+ #9 844ddba6e7c459cafd0bf4db9a3198e Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021 RIP: 0010:bnxtqueuememalloc+0x3f/0x4e0 [bnxten] Code: 41 54 4d 89 c4 4d 69 c0 c0 05 00 00 55 48 89 f5 53 48 89 fb 4c 8d b5 40 05 00 00 48 83 ec 15 RSP: 0018:ffff9dcc83fef9e8 EFLAGS: 00010202 RAX: ffffffffc0457720 RBX: ffff934ed8d40000 RCX: 0000000000000000 RDX: 000000000000001f RSI: ffff934ea508f800 RDI: ffff934ea508f808 RBP: ffff934ea508f800 R08: 000000000000b240 R09: ffff934e84f4b000 R10: ffff9dcc83fefa30 R11: ffff934e84f4b000 R12: 000000000000001f R13: ffff934ed8d40ac0 R14: ffff934ea508fd40 R15: ffff934e84f4b000 FS: 00007fa73888c740(0000) GS:ffff93559f780000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000b240 CR3: 0000000145a2e000 CR4: 00000000007506f0 PKRU: 55555554 Call Trace: <TASK> ? _die+0x20/0x70 ? pagefaultoops+0x15a/0x460 ? excpagefault+0x6e/0x180 ? asmexcpagefault+0x22/0x30 ? _pfxbnxtqueuememalloc+0x10/0x10 [bnxten 7f85e76f4d724ba07471d7e39d9e773aea6597b7] ? bnxtqueuememalloc+0x3f/0x4e0 [bnxten 7f85e76f4d724ba07471d7e39d9e773aea6597b7] netdevrxqueuerestart+0xc5/0x240 netdevmembinddmabuftoqueue+0xf8/0x200 netdevnlbindrxdoit+0x3a7/0x450 genlfamilyrcvmsgdoit+0xd9/0x130 genlrcvmsg+0x184/0x2b0 ? _pfxnetdevnlbindrxdoit+0x10/0x10 ? _pfxgenlrcvmsg+0x10/0x10 netlinkrcvskb+0x54/0x100 genlrcv+0x24/0x40 ...

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2d694c27d32efc9467a8a20e4ad641ab5adfd07d
Fixed
14eb5f0d6554653f4b159835c2f77b2a9bd7e9be
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2d694c27d32efc9467a8a20e4ad641ab5adfd07d
Fixed
d3b8cd8a8a98c7c83a693bd651f1919be36a57f2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2d694c27d32efc9467a8a20e4ad641ab5adfd07d
Fixed
ca2456e073957781e1184de68551c65161b2bd30

Affected versions

v6.*

v6.10
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.3
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1
v6.13.2
v6.13.3
v6.13.4
v6.13.5
v6.13.6
v6.13.7
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.12.20
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.8