bnxt_en: fix OOB access in DBG_BUF_PRODUCER async event handler
Summary
| CVE | CVE-2026-31395 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-03 16:16:37 UTC |
| Updated | 2026-04-03 16:16:37 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: fix OOB access in DBG_BUF_PRODUCER async event handler
The ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER handler in
bnxt_async_event_process() uses a firmware-supplied 'type' field
directly as an index into bp->bs_trace[] without bounds validation.
The 'type' field is a 16-bit value extracted from DMA-mapped completion
ring memory that the NIC writes directly to host RAM. A malicious or
compromised NIC can supply any value from 0 to 65535, causing an
out-of-bounds access into kernel heap memory.
The bnxt_bs_trace_check_wrap() call then dereferences bs_trace->magic_byte
and writes to bs_trace->last_offset and bs_trace->wrapped, leading to
kernel memory corruption or a crash.
Fix by adding a bounds check and defining BNXT_TRACE_MAX as
DBG_LOG_BUFFER_FLUSH_REQ_TYPE_ERR_QPC_TRACE + 1 to cover all currently
defined firmware trace types (0x0 through 0xc). |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 19aa416eed9e4aaf1bbe8da0f7bd9a9be31158c8 git |
Not specified |
| CNA |
Linux |
Linux |
affected 84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 b7c7a275447c6d4bf4a36a134682e2e4e20efd4b git |
Not specified |
| CNA |
Linux |
Linux |
affected 84fcd9449fd7882ddfb05ba64d75f9be2d29b2e9 64dcbde7f8f870a4f2d9daf24ffb06f9748b5dd3 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.13 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.13 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.20 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.10 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0-rc5 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/b7c7a275447c6d4bf4a36a134682e2e4e20efd4b |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/64dcbde7f8f870a4f2d9daf24ffb06f9748b5dd3 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/19aa416eed9e4aaf1bbe8da0f7bd9a9be31158c8 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.