CVE-2025-37895: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix error handling path in bnxt_init_chip() WARN_ON() is triggered in __flush_work() if bnxt_init_chip() fails because we call cancel_work_sync() on dim work that has not been initialized. WARNING: CPU: 37 PID: 5223 at kernel/workqueue.c:4201 __flush_work.isra.0+0x212/0x230 The driver relies on the BNXT_STATE_NAPI_DISABLED bit to check if dim work has already been cancelled. But in the bnxt_open() path, BNXT_STATE_NAPI_DISABLED is not set and this causes the error path to think that it needs to cancel the uninitalized dim work. Fix it by setting BNXT_STATE_NAPI_DISABLED during initialization. The bit will be cleared when we enable NAPI and initialize dim work.
AI Analysis
Technical Summary
CVE-2025-37895 is a vulnerability identified in the Linux kernel specifically affecting the Broadcom NetXtreme (bnxt) network driver. The issue arises in the error handling path of the bnxt_init_chip() function. When bnxt_init_chip() fails, the kernel triggers a WARN_ON() warning in the __flush_work() function because cancel_work_sync() is called on a deferred interrupt moderation (dim) work item that has not been properly initialized. The root cause is that the driver relies on the BNXT_STATE_NAPI_DISABLED bit to determine if the dim work has already been cancelled. However, during the bnxt_open() initialization path, this bit is not set, leading the error path to mistakenly attempt cancellation of uninitialized dim work. This results in a kernel warning and potentially unstable behavior. The fix involves setting the BNXT_STATE_NAPI_DISABLED bit during initialization, ensuring that the bit is cleared only when NAPI (New API for network packet processing) is enabled and dim work is properly initialized. This vulnerability is a logic error in the driver’s state management and error handling, which can cause kernel warnings and potentially impact system stability or cause kernel panics under certain failure conditions. No known exploits are reported in the wild as of the publication date, and the vulnerability does not have an assigned CVSS score yet.
Potential Impact
For European organizations, the impact of CVE-2025-37895 primarily concerns systems running Linux kernels with the affected bnxt network driver, which is common in servers and network appliances using Broadcom NetXtreme network interface cards (NICs). The vulnerability could lead to kernel warnings and potentially system instability or crashes when the bnxt_init_chip() function fails, which might occur during hardware initialization or driver reloads. This can result in denial of service (DoS) conditions, affecting availability of critical network services. Organizations relying on Linux-based infrastructure for data centers, cloud services, or network equipment could experience service interruptions. While no direct remote code execution or privilege escalation is indicated, the instability could be exploited indirectly by attackers to cause disruptions. Given the widespread use of Linux in European enterprises and public sector infrastructure, especially in countries with large data center operations and cloud providers, this vulnerability poses a moderate risk to availability and operational continuity.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the patched version that sets the BNXT_STATE_NAPI_DISABLED bit correctly during bnxt driver initialization. Kernel updates should be applied promptly, especially on servers and network appliances using Broadcom NetXtreme NICs. System administrators should audit their environments to identify affected systems by checking kernel versions and driver usage. Additionally, monitoring kernel logs for WARN_ON() messages related to __flush_work() and bnxt_init_chip() failures can help detect attempts to trigger this issue. In environments where immediate patching is not feasible, consider isolating affected systems from critical network segments to reduce impact of potential DoS conditions. Coordination with hardware vendors for firmware updates and driver support is also recommended. Finally, ensure robust backup and recovery procedures are in place to minimize downtime in case of system instability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Italy
CVE-2025-37895: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix error handling path in bnxt_init_chip() WARN_ON() is triggered in __flush_work() if bnxt_init_chip() fails because we call cancel_work_sync() on dim work that has not been initialized. WARNING: CPU: 37 PID: 5223 at kernel/workqueue.c:4201 __flush_work.isra.0+0x212/0x230 The driver relies on the BNXT_STATE_NAPI_DISABLED bit to check if dim work has already been cancelled. But in the bnxt_open() path, BNXT_STATE_NAPI_DISABLED is not set and this causes the error path to think that it needs to cancel the uninitalized dim work. Fix it by setting BNXT_STATE_NAPI_DISABLED during initialization. The bit will be cleared when we enable NAPI and initialize dim work.
AI-Powered Analysis
Technical Analysis
CVE-2025-37895 is a vulnerability identified in the Linux kernel specifically affecting the Broadcom NetXtreme (bnxt) network driver. The issue arises in the error handling path of the bnxt_init_chip() function. When bnxt_init_chip() fails, the kernel triggers a WARN_ON() warning in the __flush_work() function because cancel_work_sync() is called on a deferred interrupt moderation (dim) work item that has not been properly initialized. The root cause is that the driver relies on the BNXT_STATE_NAPI_DISABLED bit to determine if the dim work has already been cancelled. However, during the bnxt_open() initialization path, this bit is not set, leading the error path to mistakenly attempt cancellation of uninitialized dim work. This results in a kernel warning and potentially unstable behavior. The fix involves setting the BNXT_STATE_NAPI_DISABLED bit during initialization, ensuring that the bit is cleared only when NAPI (New API for network packet processing) is enabled and dim work is properly initialized. This vulnerability is a logic error in the driver’s state management and error handling, which can cause kernel warnings and potentially impact system stability or cause kernel panics under certain failure conditions. No known exploits are reported in the wild as of the publication date, and the vulnerability does not have an assigned CVSS score yet.
Potential Impact
For European organizations, the impact of CVE-2025-37895 primarily concerns systems running Linux kernels with the affected bnxt network driver, which is common in servers and network appliances using Broadcom NetXtreme network interface cards (NICs). The vulnerability could lead to kernel warnings and potentially system instability or crashes when the bnxt_init_chip() function fails, which might occur during hardware initialization or driver reloads. This can result in denial of service (DoS) conditions, affecting availability of critical network services. Organizations relying on Linux-based infrastructure for data centers, cloud services, or network equipment could experience service interruptions. While no direct remote code execution or privilege escalation is indicated, the instability could be exploited indirectly by attackers to cause disruptions. Given the widespread use of Linux in European enterprises and public sector infrastructure, especially in countries with large data center operations and cloud providers, this vulnerability poses a moderate risk to availability and operational continuity.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the patched version that sets the BNXT_STATE_NAPI_DISABLED bit correctly during bnxt driver initialization. Kernel updates should be applied promptly, especially on servers and network appliances using Broadcom NetXtreme NICs. System administrators should audit their environments to identify affected systems by checking kernel versions and driver usage. Additionally, monitoring kernel logs for WARN_ON() messages related to __flush_work() and bnxt_init_chip() failures can help detect attempts to trigger this issue. In environments where immediate patching is not feasible, consider isolating affected systems from critical network segments to reduce impact of potential DoS conditions. Coordination with hardware vendors for firmware updates and driver support is also recommended. Finally, ensure robust backup and recovery procedures are in place to minimize downtime in case of system instability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.964Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeaf37
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 1:12:41 AM
Last updated: 8/11/2025, 11:44:35 PM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.