VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68197

CVE-2025-68197

Description

In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()

With older FW, we may get the ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER for FW trace data type that has not been initialized. This will result in a crash in bnxt_bs_trace_type_wrap(). Add a guard to check for a valid magic_byte pointer before proceeding.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null pointer dereference in bnxt_en driver when handling an uninitialized FW trace buffer can cause a kernel crash.

Vulnerability

In the Linux kernel's bnxt_en driver, a null pointer dereference vulnerability exists in the bnxt_bs_trace_check_wrap() function. The issue occurs when the firmware sends an ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER event for a trace data type that has not been initialized. Without a proper guard, the driver attempts to access a magic_byte pointer that is NULL, leading to a crash [1].

Exploitation

An attacker with the ability to trigger or influence firmware events on a system using the bnxt_en driver (e.g., via malicious or older firmware) could cause the kernel to dereference a NULL pointer. No special privileges beyond local access to trigger the event are required, though the attack surface is limited to systems with Broadcom NetXtreme network adapters [1].

Impact

Successful exploitation results in a denial of service (kernel panic) due to the null pointer dereference. This can cause system instability or crash, potentially affecting availability of the host [1].

Mitigation

The fix adds a guard to check for a valid magic_byte pointer before proceeding, preventing the dereference. The patch has been applied to the Linux kernel stable tree [1]. Users should update to a kernel version containing this commit to mitigate the vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.