Skip to main content

CVE-2025-37895: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37895cvecve-2025-37895
Published: Tue May 20 2025 (05/20/2025, 15:21:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix error handling path in bnxt_init_chip() WARN_ON() is triggered in __flush_work() if bnxt_init_chip() fails because we call cancel_work_sync() on dim work that has not been initialized. WARNING: CPU: 37 PID: 5223 at kernel/workqueue.c:4201 __flush_work.isra.0+0x212/0x230 The driver relies on the BNXT_STATE_NAPI_DISABLED bit to check if dim work has already been cancelled. But in the bnxt_open() path, BNXT_STATE_NAPI_DISABLED is not set and this causes the error path to think that it needs to cancel the uninitalized dim work. Fix it by setting BNXT_STATE_NAPI_DISABLED during initialization. The bit will be cleared when we enable NAPI and initialize dim work.

AI-Powered Analysis

AILast updated: 07/04/2025, 01:12:41 UTC

Technical Analysis

CVE-2025-37895 is a vulnerability identified in the Linux kernel specifically affecting the Broadcom NetXtreme (bnxt) network driver. The issue arises in the error handling path of the bnxt_init_chip() function. When bnxt_init_chip() fails, the kernel triggers a WARN_ON() warning in the __flush_work() function because cancel_work_sync() is called on a deferred interrupt moderation (dim) work item that has not been properly initialized. The root cause is that the driver relies on the BNXT_STATE_NAPI_DISABLED bit to determine if the dim work has already been cancelled. However, during the bnxt_open() initialization path, this bit is not set, leading the error path to mistakenly attempt cancellation of uninitialized dim work. This results in a kernel warning and potentially unstable behavior. The fix involves setting the BNXT_STATE_NAPI_DISABLED bit during initialization, ensuring that the bit is cleared only when NAPI (New API for network packet processing) is enabled and dim work is properly initialized. This vulnerability is a logic error in the driver’s state management and error handling, which can cause kernel warnings and potentially impact system stability or cause kernel panics under certain failure conditions. No known exploits are reported in the wild as of the publication date, and the vulnerability does not have an assigned CVSS score yet.

Potential Impact

For European organizations, the impact of CVE-2025-37895 primarily concerns systems running Linux kernels with the affected bnxt network driver, which is common in servers and network appliances using Broadcom NetXtreme network interface cards (NICs). The vulnerability could lead to kernel warnings and potentially system instability or crashes when the bnxt_init_chip() function fails, which might occur during hardware initialization or driver reloads. This can result in denial of service (DoS) conditions, affecting availability of critical network services. Organizations relying on Linux-based infrastructure for data centers, cloud services, or network equipment could experience service interruptions. While no direct remote code execution or privilege escalation is indicated, the instability could be exploited indirectly by attackers to cause disruptions. Given the widespread use of Linux in European enterprises and public sector infrastructure, especially in countries with large data center operations and cloud providers, this vulnerability poses a moderate risk to availability and operational continuity.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the patched version that sets the BNXT_STATE_NAPI_DISABLED bit correctly during bnxt driver initialization. Kernel updates should be applied promptly, especially on servers and network appliances using Broadcom NetXtreme NICs. System administrators should audit their environments to identify affected systems by checking kernel versions and driver usage. Additionally, monitoring kernel logs for WARN_ON() messages related to __flush_work() and bnxt_init_chip() failures can help detect attempts to trigger this issue. In environments where immediate patching is not feasible, consider isolating affected systems from critical network segments to reduce impact of potential DoS conditions. Coordination with hardware vendors for firmware updates and driver support is also recommended. Finally, ensure robust backup and recovery procedures are in place to minimize downtime in case of system instability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.964Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaf37

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 1:12:41 AM

Last updated: 8/11/2025, 11:44:35 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats