CVE-2025-21973: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx} When qstats-get operation is executed, callbacks of netdev_stats_ops are called. The bnxt_get_queue_stats{rx | tx} collect per-queue stats from sw_stats in the rings. But {rx | tx | cp}_ring are allocated when the interface is up. So, these rings are not allocated when the interface is down. The qstats-get is allowed even if the interface is down. However, the bnxt_get_queue_stats{rx | tx}() accesses cp_ring and tx_ring without null check. So, it needs to avoid accessing rings if the interface is down. Reproducer: ip link set $interface down ./cli.py --spec netdev.yaml --dump qstats-get OR ip link set $interface down python ./stats.py Splat looks like: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 1680fa067 P4D 1680fa067 PUD 16be3b067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 UID: 0 PID: 1495 Comm: python3 Not tainted 6.14.0-rc4+ #32 5cd0f999d5a15c574ac72b3e4b907341 Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021 RIP: 0010:bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en] Code: c6 87 b5 18 00 00 02 eb a2 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 01 RSP: 0018:ffffabef43cdb7e0 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffffc04c8710 RCX: 0000000000000000 RDX: ffffabef43cdb858 RSI: 0000000000000000 RDI: ffff8d504e850000 RBP: ffff8d506c9f9c00 R08: 0000000000000004 R09: ffff8d506bcd901c R10: 0000000000000015 R11: ffff8d506bcd9000 R12: 0000000000000000 R13: ffffabef43cdb8c0 R14: ffff8d504e850000 R15: 0000000000000000 FS: 00007f2c5462b080(0000) GS:ffff8d575f600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000167fd0000 CR4: 00000000007506f0 PKRU: 55555554 Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x15a/0x460 ? sched_balance_find_src_group+0x58d/0xd10 ? exc_page_fault+0x6e/0x180 ? asm_exc_page_fault+0x22/0x30 ? bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en cdd546fd48563c280cfd30e9647efa420db07bf1] netdev_nl_stats_by_netdev+0x2b1/0x4e0 ? xas_load+0x9/0xb0 ? xas_find+0x183/0x1d0 ? xa_find+0x8b/0xe0 netdev_nl_qstats_get_dumpit+0xbf/0x1e0 genl_dumpit+0x31/0x90 netlink_dump+0x1a8/0x360
AI Analysis
Technical Summary
CVE-2025-21973 is a vulnerability identified in the Linux kernel's Broadcom NetXtreme (bnxt) Ethernet driver, specifically within the bnxt_get_queue_stats_rx and bnxt_get_queue_stats_tx functions. These functions are responsible for collecting per-queue statistics from software rings associated with network interface queues. The vulnerability arises because these functions access certain ring buffers (cp_ring and tx_ring) without verifying whether the network interface is up or down. The rings are only allocated when the interface is up, but the qstats-get operation, which triggers these functions, is allowed even when the interface is down. Consequently, if qstats-get is executed while the interface is down, the driver attempts to access unallocated memory, leading to a NULL pointer dereference and a kernel panic. This results in a denial-of-service (DoS) condition due to the kernel crash. The issue is reproducible by bringing the network interface down and then executing qstats-get commands, as demonstrated by the provided reproducer scripts. The kernel panic manifests as a page fault in kernel mode, with detailed call traces pointing to the bnxt_get_queue_stats_rx function. This vulnerability is rooted in improper null pointer checks and inadequate state validation within the bnxt driver code. While no known exploits are reported in the wild, the flaw can be triggered locally by users with the ability to execute network statistics queries, potentially causing system instability or downtime. The vulnerability affects specific Linux kernel versions identified by commit hashes, and a fix involves adding appropriate null checks to prevent access to unallocated rings when the interface is down.
Potential Impact
For European organizations, the impact of CVE-2025-21973 primarily involves potential denial-of-service conditions on Linux systems utilizing Broadcom NetXtreme Ethernet hardware. This can lead to unexpected kernel panics and system crashes, disrupting network connectivity and critical services. Organizations relying on Linux servers for network infrastructure, cloud services, or data centers may experience outages or degraded performance. The vulnerability could affect environments where network interfaces are frequently cycled or managed dynamically, such as in virtualized or containerized deployments. Although exploitation requires local access and the ability to invoke network statistics queries, insider threats or compromised accounts could leverage this flaw to cause service interruptions. The lack of remote exploitability limits the threat surface, but the resulting kernel panic could impact availability of critical systems, leading to operational disruptions and potential financial losses. Additionally, recovery from kernel panics may require manual intervention, increasing administrative overhead. Given the widespread use of Linux in European enterprises, especially in telecommunications, finance, and government sectors, the vulnerability poses a tangible risk to system stability and service continuity.
Mitigation Recommendations
To mitigate CVE-2025-21973, European organizations should: 1) Apply the official Linux kernel patches that address this vulnerability by adding null pointer checks in the bnxt driver to prevent access to unallocated rings when the interface is down. 2) Identify and inventory all systems running affected Linux kernel versions with Broadcom NetXtreme Ethernet hardware. 3) Implement strict access controls to limit who can execute network statistics queries or perform network interface state changes, reducing the risk of local exploitation. 4) Monitor system logs and kernel messages for signs of kernel panics or crashes related to the bnxt driver, enabling early detection of attempted exploitation or instability. 5) In environments where patching is delayed, consider temporarily disabling or avoiding the use of qstats-get operations on interfaces that may be down, or avoid bringing interfaces down unnecessarily. 6) Incorporate this vulnerability into incident response and system hardening policies, ensuring that administrators are aware of the risk and remediation steps. 7) For critical systems, consider deploying kernel live patching solutions if available to minimize downtime during patch application. These targeted measures go beyond generic advice by focusing on controlling the specific operations that trigger the vulnerability and ensuring rapid patch deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-21973: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx} When qstats-get operation is executed, callbacks of netdev_stats_ops are called. The bnxt_get_queue_stats{rx | tx} collect per-queue stats from sw_stats in the rings. But {rx | tx | cp}_ring are allocated when the interface is up. So, these rings are not allocated when the interface is down. The qstats-get is allowed even if the interface is down. However, the bnxt_get_queue_stats{rx | tx}() accesses cp_ring and tx_ring without null check. So, it needs to avoid accessing rings if the interface is down. Reproducer: ip link set $interface down ./cli.py --spec netdev.yaml --dump qstats-get OR ip link set $interface down python ./stats.py Splat looks like: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 1680fa067 P4D 1680fa067 PUD 16be3b067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 UID: 0 PID: 1495 Comm: python3 Not tainted 6.14.0-rc4+ #32 5cd0f999d5a15c574ac72b3e4b907341 Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021 RIP: 0010:bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en] Code: c6 87 b5 18 00 00 02 eb a2 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 01 RSP: 0018:ffffabef43cdb7e0 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffffc04c8710 RCX: 0000000000000000 RDX: ffffabef43cdb858 RSI: 0000000000000000 RDI: ffff8d504e850000 RBP: ffff8d506c9f9c00 R08: 0000000000000004 R09: ffff8d506bcd901c R10: 0000000000000015 R11: ffff8d506bcd9000 R12: 0000000000000000 R13: ffffabef43cdb8c0 R14: ffff8d504e850000 R15: 0000000000000000 FS: 00007f2c5462b080(0000) GS:ffff8d575f600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000167fd0000 CR4: 00000000007506f0 PKRU: 55555554 Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x15a/0x460 ? sched_balance_find_src_group+0x58d/0xd10 ? exc_page_fault+0x6e/0x180 ? asm_exc_page_fault+0x22/0x30 ? bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en cdd546fd48563c280cfd30e9647efa420db07bf1] netdev_nl_stats_by_netdev+0x2b1/0x4e0 ? xas_load+0x9/0xb0 ? xas_find+0x183/0x1d0 ? xa_find+0x8b/0xe0 netdev_nl_qstats_get_dumpit+0xbf/0x1e0 genl_dumpit+0x31/0x90 netlink_dump+0x1a8/0x360
AI-Powered Analysis
Technical Analysis
CVE-2025-21973 is a vulnerability identified in the Linux kernel's Broadcom NetXtreme (bnxt) Ethernet driver, specifically within the bnxt_get_queue_stats_rx and bnxt_get_queue_stats_tx functions. These functions are responsible for collecting per-queue statistics from software rings associated with network interface queues. The vulnerability arises because these functions access certain ring buffers (cp_ring and tx_ring) without verifying whether the network interface is up or down. The rings are only allocated when the interface is up, but the qstats-get operation, which triggers these functions, is allowed even when the interface is down. Consequently, if qstats-get is executed while the interface is down, the driver attempts to access unallocated memory, leading to a NULL pointer dereference and a kernel panic. This results in a denial-of-service (DoS) condition due to the kernel crash. The issue is reproducible by bringing the network interface down and then executing qstats-get commands, as demonstrated by the provided reproducer scripts. The kernel panic manifests as a page fault in kernel mode, with detailed call traces pointing to the bnxt_get_queue_stats_rx function. This vulnerability is rooted in improper null pointer checks and inadequate state validation within the bnxt driver code. While no known exploits are reported in the wild, the flaw can be triggered locally by users with the ability to execute network statistics queries, potentially causing system instability or downtime. The vulnerability affects specific Linux kernel versions identified by commit hashes, and a fix involves adding appropriate null checks to prevent access to unallocated rings when the interface is down.
Potential Impact
For European organizations, the impact of CVE-2025-21973 primarily involves potential denial-of-service conditions on Linux systems utilizing Broadcom NetXtreme Ethernet hardware. This can lead to unexpected kernel panics and system crashes, disrupting network connectivity and critical services. Organizations relying on Linux servers for network infrastructure, cloud services, or data centers may experience outages or degraded performance. The vulnerability could affect environments where network interfaces are frequently cycled or managed dynamically, such as in virtualized or containerized deployments. Although exploitation requires local access and the ability to invoke network statistics queries, insider threats or compromised accounts could leverage this flaw to cause service interruptions. The lack of remote exploitability limits the threat surface, but the resulting kernel panic could impact availability of critical systems, leading to operational disruptions and potential financial losses. Additionally, recovery from kernel panics may require manual intervention, increasing administrative overhead. Given the widespread use of Linux in European enterprises, especially in telecommunications, finance, and government sectors, the vulnerability poses a tangible risk to system stability and service continuity.
Mitigation Recommendations
To mitigate CVE-2025-21973, European organizations should: 1) Apply the official Linux kernel patches that address this vulnerability by adding null pointer checks in the bnxt driver to prevent access to unallocated rings when the interface is down. 2) Identify and inventory all systems running affected Linux kernel versions with Broadcom NetXtreme Ethernet hardware. 3) Implement strict access controls to limit who can execute network statistics queries or perform network interface state changes, reducing the risk of local exploitation. 4) Monitor system logs and kernel messages for signs of kernel panics or crashes related to the bnxt driver, enabling early detection of attempted exploitation or instability. 5) In environments where patching is delayed, consider temporarily disabling or avoiding the use of qstats-get operations on interfaces that may be down, or avoid bringing interfaces down unnecessarily. 6) Incorporate this vulnerability into incident response and system hardening policies, ensuring that administrators are aware of the risk and remediation steps. 7) For critical systems, consider deploying kernel live patching solutions if available to minimize downtime during patch application. These targeted measures go beyond generic advice by focusing on controlling the specific operations that trigger the vulnerability and ensuring rapid patch deployment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.797Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8dcf
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:25:55 AM
Last updated: 8/18/2025, 1:26:39 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.