Home

Description

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() With older FW, we may get the ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER for FW trace data type that has not been initialized. This will result in a crash in bnxt_bs_trace_type_wrap(). Add a guard to check for a valid magic_byte pointer before proceeding.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 (git) before 689ae5ba31293eebb7f21c0ef8939468ac72b5ce
affected

84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 (git) before ff02be05f78399c766be68ab0b2285ff90b2aaa8
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/689ae5ba31293eebb7f21c0ef8939468ac72b5ce

git.kernel.org/...c/ff02be05f78399c766be68ab0b2285ff90b2aaa8

cve.org (CVE-2025-68197)

nvd.nist.gov (CVE-2025-68197)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.