Skip to main content

CVE-2025-22112: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-22112cvecve-2025-22112
Published: Wed Apr 16 2025 (04/16/2025, 14:12:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix out-of-range access of vnic_info array The bnxt_queue_{start | stop}() access vnic_info as much as allocated, which indicates bp->nr_vnics. So, it should not reach bp->vnic_info[bp->nr_vnics].

AI-Powered Analysis

AILast updated: 07/03/2025, 21:26:59 UTC

Technical Analysis

CVE-2025-22112 is a vulnerability identified in the Linux kernel's Broadcom NetXtreme (bnxt) Ethernet driver, specifically related to the handling of the vnic_info array within the bnxt_queue_start() and bnxt_queue_stop() functions. The issue arises because these functions access the vnic_info array up to the number of allocated virtual NICs (bp->nr_vnics), but the code does not properly prevent out-of-range access at the boundary bp->vnic_info[bp->nr_vnics]. This off-by-one or out-of-bounds access can lead to reading or writing memory beyond the allocated array, potentially causing memory corruption. Such memory corruption could be exploited to cause a denial of service (kernel crash) or, in more severe cases, privilege escalation if an attacker can manipulate the memory layout to execute arbitrary code within the kernel context. The vulnerability affects multiple Linux kernel versions identified by their commit hashes, indicating it is present in several recent kernel builds prior to the patch. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that the bnxt driver strictly bounds its access to the vnic_info array within the allocated range, preventing any out-of-range memory access.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected bnxt Ethernet driver, which is commonly used in servers and data center environments leveraging Broadcom NetXtreme network adapters. Potential impacts include system instability or crashes due to kernel memory corruption, leading to denial of service conditions. More critically, if exploited, it could allow attackers to escalate privileges on affected systems, compromising confidentiality and integrity of sensitive data. This is particularly concerning for enterprises relying on Linux-based infrastructure for critical services, cloud providers, and telecom operators in Europe. Disruption or compromise of such systems could impact business continuity, data protection compliance (e.g., GDPR), and operational security. Although no active exploits are known, the presence of a kernel-level vulnerability warrants prompt attention due to the high value of kernel privileges and the widespread use of Linux in European IT environments.

Mitigation Recommendations

European organizations should immediately assess their Linux kernel versions and identify systems using the affected bnxt driver versions. Applying the official Linux kernel patches that fix CVE-2025-22112 is the primary mitigation step. If patching is not immediately feasible, organizations should consider temporary mitigations such as disabling or unloading the bnxt driver if network configuration permits, or isolating vulnerable systems from untrusted networks to reduce exposure. Monitoring kernel logs for unusual activity or crashes related to the bnxt driver can help detect attempted exploitation. Additionally, organizations should enforce strict access controls and limit user privileges to reduce the risk of local exploitation. Network segmentation and intrusion detection systems tuned to detect anomalous kernel behavior can further enhance defense. Finally, maintaining up-to-date inventories of hardware and kernel versions will facilitate rapid response to such vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.820Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd415

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 7/3/2025, 9:26:59 PM

Last updated: 8/16/2025, 10:24:40 AM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats