CVE-2025-22112: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix out-of-range access of vnic_info array The bnxt_queue_{start | stop}() access vnic_info as much as allocated, which indicates bp->nr_vnics. So, it should not reach bp->vnic_info[bp->nr_vnics].
AI Analysis
Technical Summary
CVE-2025-22112 is a vulnerability identified in the Linux kernel's Broadcom NetXtreme (bnxt) Ethernet driver, specifically related to the handling of the vnic_info array within the bnxt_queue_start() and bnxt_queue_stop() functions. The issue arises because these functions access the vnic_info array up to the number of allocated virtual NICs (bp->nr_vnics), but the code does not properly prevent out-of-range access at the boundary bp->vnic_info[bp->nr_vnics]. This off-by-one or out-of-bounds access can lead to reading or writing memory beyond the allocated array, potentially causing memory corruption. Such memory corruption could be exploited to cause a denial of service (kernel crash) or, in more severe cases, privilege escalation if an attacker can manipulate the memory layout to execute arbitrary code within the kernel context. The vulnerability affects multiple Linux kernel versions identified by their commit hashes, indicating it is present in several recent kernel builds prior to the patch. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that the bnxt driver strictly bounds its access to the vnic_info array within the allocated range, preventing any out-of-range memory access.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected bnxt Ethernet driver, which is commonly used in servers and data center environments leveraging Broadcom NetXtreme network adapters. Potential impacts include system instability or crashes due to kernel memory corruption, leading to denial of service conditions. More critically, if exploited, it could allow attackers to escalate privileges on affected systems, compromising confidentiality and integrity of sensitive data. This is particularly concerning for enterprises relying on Linux-based infrastructure for critical services, cloud providers, and telecom operators in Europe. Disruption or compromise of such systems could impact business continuity, data protection compliance (e.g., GDPR), and operational security. Although no active exploits are known, the presence of a kernel-level vulnerability warrants prompt attention due to the high value of kernel privileges and the widespread use of Linux in European IT environments.
Mitigation Recommendations
European organizations should immediately assess their Linux kernel versions and identify systems using the affected bnxt driver versions. Applying the official Linux kernel patches that fix CVE-2025-22112 is the primary mitigation step. If patching is not immediately feasible, organizations should consider temporary mitigations such as disabling or unloading the bnxt driver if network configuration permits, or isolating vulnerable systems from untrusted networks to reduce exposure. Monitoring kernel logs for unusual activity or crashes related to the bnxt driver can help detect attempted exploitation. Additionally, organizations should enforce strict access controls and limit user privileges to reduce the risk of local exploitation. Network segmentation and intrusion detection systems tuned to detect anomalous kernel behavior can further enhance defense. Finally, maintaining up-to-date inventories of hardware and kernel versions will facilitate rapid response to such vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-22112: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix out-of-range access of vnic_info array The bnxt_queue_{start | stop}() access vnic_info as much as allocated, which indicates bp->nr_vnics. So, it should not reach bp->vnic_info[bp->nr_vnics].
AI-Powered Analysis
Technical Analysis
CVE-2025-22112 is a vulnerability identified in the Linux kernel's Broadcom NetXtreme (bnxt) Ethernet driver, specifically related to the handling of the vnic_info array within the bnxt_queue_start() and bnxt_queue_stop() functions. The issue arises because these functions access the vnic_info array up to the number of allocated virtual NICs (bp->nr_vnics), but the code does not properly prevent out-of-range access at the boundary bp->vnic_info[bp->nr_vnics]. This off-by-one or out-of-bounds access can lead to reading or writing memory beyond the allocated array, potentially causing memory corruption. Such memory corruption could be exploited to cause a denial of service (kernel crash) or, in more severe cases, privilege escalation if an attacker can manipulate the memory layout to execute arbitrary code within the kernel context. The vulnerability affects multiple Linux kernel versions identified by their commit hashes, indicating it is present in several recent kernel builds prior to the patch. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that the bnxt driver strictly bounds its access to the vnic_info array within the allocated range, preventing any out-of-range memory access.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected bnxt Ethernet driver, which is commonly used in servers and data center environments leveraging Broadcom NetXtreme network adapters. Potential impacts include system instability or crashes due to kernel memory corruption, leading to denial of service conditions. More critically, if exploited, it could allow attackers to escalate privileges on affected systems, compromising confidentiality and integrity of sensitive data. This is particularly concerning for enterprises relying on Linux-based infrastructure for critical services, cloud providers, and telecom operators in Europe. Disruption or compromise of such systems could impact business continuity, data protection compliance (e.g., GDPR), and operational security. Although no active exploits are known, the presence of a kernel-level vulnerability warrants prompt attention due to the high value of kernel privileges and the widespread use of Linux in European IT environments.
Mitigation Recommendations
European organizations should immediately assess their Linux kernel versions and identify systems using the affected bnxt driver versions. Applying the official Linux kernel patches that fix CVE-2025-22112 is the primary mitigation step. If patching is not immediately feasible, organizations should consider temporary mitigations such as disabling or unloading the bnxt driver if network configuration permits, or isolating vulnerable systems from untrusted networks to reduce exposure. Monitoring kernel logs for unusual activity or crashes related to the bnxt driver can help detect attempted exploitation. Additionally, organizations should enforce strict access controls and limit user privileges to reduce the risk of local exploitation. Network segmentation and intrusion detection systems tuned to detect anomalous kernel behavior can further enhance defense. Finally, maintaining up-to-date inventories of hardware and kernel versions will facilitate rapid response to such vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.820Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd415
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 7/3/2025, 9:26:59 PM
Last updated: 8/16/2025, 10:24:40 AM
Views: 23
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.