Home

Description

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Shutdown FW DMA in bnxt_shutdown() The netif_close() call in bnxt_shutdown() only stops packet DMA. There may be FW DMA for trace logging (recently added) that will continue. If we kexec to a new kernel, the DMA will corrupt memory in the new kernel. Add bnxt_hwrm_func_drv_unrgtr() to unregister the driver from the FW. This will stop the FW DMA. In case the call fails, call pcie_flr() to reset the function and stop the DMA.

PUBLISHED Reserved 2025-04-16 | Published 2025-12-09 | Updated 2025-12-09 | Assigner Linux

Product status

Default status
unaffected

24d694aec139e9e0a31c60993db79bd8ad575afe (git) before 1a8a15c3f71d1199d510ccba4bc201cbd2204048
affected

24d694aec139e9e0a31c60993db79bd8ad575afe (git) before bc7208ca805ae6062f353a4753467d913d963bc6
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1a8a15c3f71d1199d510ccba4bc201cbd2204048

git.kernel.org/...c/bc7208ca805ae6062f353a4753467d913d963bc6

cve.org (CVE-2025-40330)

nvd.nist.gov (CVE-2025-40330)

Download JSON