VYPR
Unrated severityNVD Advisory· Published Dec 4, 2025· Updated Apr 15, 2026

CVE-2025-40264

CVE-2025-40264

Description

In the Linux kernel, the following vulnerability has been resolved:

be2net: pass wrb_params in case of OS2BMC

be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site.  This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packet") states.

The correct way would be to pass the wrb_params from be_xmit().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's be2net driver, a NULL pointer dereference vulnerability exists when sending packets to BMC, potentially leading to a system crash.

In the Linux kernel's be2net driver, a NULL pointer dereference vulnerability affects the processing of packets sent to the Baseboard Management Controller (BMC). The function be_insert_vlan_in_pkt() is called with a NULL wrb_params argument at the be_send_pkt_to_bmc() call site, which may lead to a NULL pointer dereference when handling a workaround for a specific IPv6 packet [1].

To exploit this vulnerability, an attacker needs to trigger the specific packet condition that invokes the workaround path. This could potentially be achieved by sending crafted network packets to the system, though the exact prerequisites are not detailed. The issue does not require authentication if the attacker can control network traffic reaching the affected driver [1].

A successful exploitation could cause a kernel NULL pointer dereference, leading to a system crash or denial of service. No further impact such as code execution is described in the source [1].

The vulnerability is fixed in updated Linux kernel stable releases. The commit referenced addresses the issue by ensuring wrb_params is properly passed from be_xmit(). System administrators should apply the latest kernel updates to mitigate this vulnerability [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.