Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-37911 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU109514
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37911
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bnxt_hwrm_dbg_dma_data() function in drivers/net/ethernet/broadcom/bnxt/bnxt_coredump.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.15 - 6.14.5
CPE2.3https://git.kernel.org/stable/c/43292b83424158fa6ec458799f3cb9c54d18c484
https://git.kernel.org/stable/c/44807af79efd0d78fa36383dd865ddfe7992c0a6
https://git.kernel.org/stable/c/44d81a9ebf0cad92512e0ffdf7412bfe20db66ec
https://git.kernel.org/stable/c/4d69864915a3a052538e4ba76cd6fd77cfc64ebe
https://git.kernel.org/stable/c/69b10dd23ab826d0c7f2d9ab311842251978d0c1
https://git.kernel.org/stable/c/6b87bd94f34370bbf1dfa59352bed8efab5bf419
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.182
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.138
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.28
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14.6
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.90
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.