CVE-2026-23041

Source
https://cve.org/CVERecord?id=CVE-2026-23041
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23041.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23041
Downstream
Published
2026-02-04T16:00:24.710Z
Modified
2026-02-09T19:33:42.488140Z
Summary
bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup
Details

In the Linux kernel, the following vulnerability has been resolved:

bnxten: Fix NULL pointer crash in bnxtptp_enable during error cleanup

When bnxtinitone() fails during initialization (e.g., bnxtinitintmode returns -ENODEV), the error path calls bnxtfreehwrmresources() which destroys the DMA pool and sets bp->hwrmdmapool to NULL. Subsequently, bnxtptpclear() is called, which invokes ptpclockunregister().

Since commit a60fc3294a37 ("ptp: rework ptpclockunregister() to disable events"), ptpclockunregister() now calls ptpdisableallevents(), which in turn invokes the driver's .enable() callback (bnxtptp_enable()) to disable PTP events before completing the unregistration.

bnxtptpenable() attempts to send HWRM commands via bnxtptpcfgpin() and bnxtptpcfgevent(), both of which call hwrmreqinit(). This function tries to allocate from bp->hwrmdmapool, causing a NULL pointer dereference:

bnxten 0000:01:00.0 (unnamed netdevice) (uninitialized): bnxtinitint_mode err: ffffffed KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] Call Trace: _hwrmreqinit (drivers/net/ethernet/broadcom/bnxt/bnxthwrm.c:72) bnxtptpenable (drivers/net/ethernet/broadcom/bnxt/bnxtptp.c:323 drivers/net/ethernet/broadcom/bnxt/bnxtptp.c:517) ptpdisableallevents (drivers/ptp/ptpchardev.c:66) ptpclockunregister (drivers/ptp/ptpclock.c:518) bnxtptpclear (drivers/net/ethernet/broadcom/bnxt/bnxtptp.c:1134) bnxtinitone (drivers/net/ethernet/broadcom/bnxt/bnxt.c:16889)

Lines are against commit f8f9c1f4d0c7 ("Linux 6.19-rc3")

Fix this by clearing and unregistering ptp (bnxtptpclear()) before freeing HWRM resources.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23041.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a60fc3294a377204664b5484e4a487fa124155da
Fixed
0174d5466caefc22f03a36c43b2a3cce7e332627
Fixed
3358995b1a7f9dcb52a56ec8251570d71024dad0

Affected versions

v6.*
v6.17
v6.17-rc6
v6.17-rc7
v6.18
v6.18-rc1
v6.18-rc2
v6.18-rc3
v6.18-rc4
v6.18-rc5
v6.18-rc6
v6.18-rc7
v6.18.1
v6.18.2
v6.18.3
v6.18.4
v6.18.5
v6.19-rc1
v6.19-rc2
v6.19-rc3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23041.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23041.json"