CVE-2025-37895

Source
https://cve.org/CVERecord?id=CVE-2025-37895
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37895.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37895
Downstream
Published
2025-05-20T15:21:32.045Z
Modified
2026-05-15T04:13:30.417644043Z
Summary
bnxt_en: Fix error handling path in bnxt_init_chip()
Details

In the Linux kernel, the following vulnerability has been resolved:

bnxten: Fix error handling path in bnxtinit_chip()

WARN_ON() is triggered in _flushwork() if bnxtinitchip() fails because we call cancelworksync() on dim work that has not been initialized.

WARNING: CPU: 37 PID: 5223 at kernel/workqueue.c:4201 _flushwork.isra.0+0x212/0x230

The driver relies on the BNXTSTATENAPIDISABLED bit to check if dim work has already been cancelled. But in the bnxtopen() path, BNXTSTATENAPIDISABLED is not set and this causes the error path to think that it needs to cancel the uninitalized dim work. Fix it by setting BNXTSTATENAPIDISABLED during initialization. The bit will be cleared when we enable NAPI and initialize dim work.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37895.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.28
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37895.json"