DEBIAN-CVE-2026-23041

Source
https://security-tracker.debian.org/tracker/CVE-2026-23041
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23041.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-23041
Upstream
Published
2026-02-04T16:16:19.563Z
Modified
2026-02-13T04:01:24.602645Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: bnxten: Fix NULL pointer crash in bnxtptpenable during error cleanup When bnxtinitone() fails during initialization (e.g., bnxtinitintmode returns -ENODEV), the error path calls bnxtfreehwrmresources() which destroys the DMA pool and sets bp->hwrmdmapool to NULL. Subsequently, bnxtptpclear() is called, which invokes ptpclockunregister(). Since commit a60fc3294a37 ("ptp: rework ptpclockunregister() to disable events"), ptpclockunregister() now calls ptpdisableallevents(), which in turn invokes the driver's .enable() callback (bnxtptpenable()) to disable PTP events before completing the unregistration. bnxtptpenable() attempts to send HWRM commands via bnxtptpcfgpin() and bnxtptpcfgevent(), both of which call hwrmreqinit(). This function tries to allocate from bp->hwrmdmapool, causing a NULL pointer dereference: bnxten 0000:01:00.0 (unnamed netdevice) (uninitialized): bnxtinitint_mode err: ffffffed KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] Call Trace: _hwrmreqinit (drivers/net/ethernet/broadcom/bnxt/bnxthwrm.c:72) bnxtptpenable (drivers/net/ethernet/broadcom/bnxt/bnxtptp.c:323 drivers/net/ethernet/broadcom/bnxt/bnxtptp.c:517) ptpdisableallevents (drivers/ptp/ptpchardev.c:66) ptpclockunregister (drivers/ptp/ptpclock.c:518) bnxtptpclear (drivers/net/ethernet/broadcom/bnxt/bnxtptp.c:1134) bnxtinitone (drivers/net/ethernet/broadcom/bnxt/bnxt.c:16889) Lines are against commit f8f9c1f4d0c7 ("Linux 6.19-rc3") Fix this by clearing and unregistering ptp (bnxtptpclear()) before freeing HWRM resources.

References

Affected packages

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.18.8-1

Affected versions

6.*
6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1
6.12.57-1
6.12.63-1~bpo12+1
6.12.63-1
6.12.69-1~bpo12+1
6.12.69-1
6.12.73-1~bpo12+1
6.12.73-1
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1
6.16.1-1~exp1
6.16.3-1~bpo13+1
6.16.3-1
6.16.5-1
6.16.6-1
6.16.7-1
6.16.8-1
6.16.9-1
6.16.10-1
6.16.11-1
6.16.12-1~bpo13+1
6.16.12-1
6.16.12-2
6.17.2-1~exp1
6.17.5-1~exp1
6.17.6-1
6.17.7-1
6.17.7-2
6.17.8-1~bpo13+1
6.17.8-1
6.17.9-1
6.17.10-1
6.17.11-1
6.17.12-1
6.17.13-1~bpo13+1
6.17.13-1
6.18~rc4-1~exp1
6.18~rc4-1~exp2
6.18~rc5-1~exp1
6.18~rc6-1~exp1
6.18~rc7-1~exp1
6.18.1-1~exp1
6.18.2-1~exp1
6.18.3-1
6.18.5-1~bpo13+1
6.18.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23041.json"