CVE-2025-68197
Description
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()
With older FW, we may get the ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER for FW trace data type that has not been initialized. This will result in a crash in bnxt_bs_trace_type_wrap(). Add a guard to check for a valid magic_byte pointer before proceeding.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in bnxt_en driver when handling an uninitialized FW trace buffer can cause a kernel crash.
Vulnerability
In the Linux kernel's bnxt_en driver, a null pointer dereference vulnerability exists in the bnxt_bs_trace_check_wrap() function. The issue occurs when the firmware sends an ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER event for a trace data type that has not been initialized. Without a proper guard, the driver attempts to access a magic_byte pointer that is NULL, leading to a crash [1].
Exploitation
An attacker with the ability to trigger or influence firmware events on a system using the bnxt_en driver (e.g., via malicious or older firmware) could cause the kernel to dereference a NULL pointer. No special privileges beyond local access to trigger the event are required, though the attack surface is limited to systems with Broadcom NetXtreme network adapters [1].
Impact
Successful exploitation results in a denial of service (kernel panic) due to the null pointer dereference. This can cause system instability or crash, potentially affecting availability of the host [1].
Mitigation
The fix adds a guard to check for a valid magic_byte pointer before proceeding, preventing the dereference. The patch has been applied to the Linux kernel stable tree [1]. Users should update to a kernel version containing this commit to mitigate the vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.