Home

Description

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: fix OOB access in DBG_BUF_PRODUCER async event handler The ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER handler in bnxt_async_event_process() uses a firmware-supplied 'type' field directly as an index into bp->bs_trace[] without bounds validation. The 'type' field is a 16-bit value extracted from DMA-mapped completion ring memory that the NIC writes directly to host RAM. A malicious or compromised NIC can supply any value from 0 to 65535, causing an out-of-bounds access into kernel heap memory. The bnxt_bs_trace_check_wrap() call then dereferences bs_trace->magic_byte and writes to bs_trace->last_offset and bs_trace->wrapped, leading to kernel memory corruption or a crash. Fix by adding a bounds check and defining BNXT_TRACE_MAX as DBG_LOG_BUFFER_FLUSH_REQ_TYPE_ERR_QPC_TRACE + 1 to cover all currently defined firmware trace types (0x0 through 0xc).

PUBLISHED Reserved 2026-03-09 | Published 2026-04-03 | Updated 2026-05-11 | Assigner Linux

Product status

Default status
unaffected

84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 (git) before 19aa416eed9e4aaf1bbe8da0f7bd9a9be31158c8
affected

84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 (git) before b7c7a275447c6d4bf4a36a134682e2e4e20efd4b
affected

84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 (git) before 64dcbde7f8f870a4f2d9daf24ffb06f9748b5dd3
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.18.20 (semver)
unaffected

6.19.10 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/19aa416eed9e4aaf1bbe8da0f7bd9a9be31158c8

git.kernel.org/...c/b7c7a275447c6d4bf4a36a134682e2e4e20efd4b

git.kernel.org/...c/64dcbde7f8f870a4f2d9daf24ffb06f9748b5dd3

cve.org (CVE-2026-31395)

nvd.nist.gov (CVE-2026-31395)

Download JSON