Description
In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: set backing store type from query type

bnxt_hwrm_func_backing_store_qcaps_v2() stores resp->type from the
firmware response in ctxm->type and later uses that value to index
fixed backing-store metadata arrays such as ctx_arr[] and
bnxt_bstore_to_trace[].

ctxm->type is fixed by the current backing-store query type and matches
the array index of ctx->ctx_arr. Set ctxm->type from the current loop
variable instead of depending on resp->type.

Also update the loop to advance type from next_valid_type in the for
statement, which keeps the control flow simpler for non-valid and
unchanged entries.
Published: 2026-05-01
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel's bnxt_en driver, a flaw was discovered wherein a type value obtained from the firmware response was used to index internal arrays. If the firmware returns an unexpected value, the driver may write to or read beyond the bounds of these arrays, resulting in kernel memory corruption and potentially enabling arbitrary code execution with kernel privileges. This weakness corresponds to CWE-787: Out‑of‑Bounds Write and CWE-823: Improper Validation or Sanitization.

Affected Systems

The issue affects systems running the Linux kernel that include the bnxt_en network driver for Broadcom NetXtreme‑E adapters. No specific kernel or firmware version is supplied, so any installation that contains the bnxt_en driver without the patch commit may be vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate risk, and the EPSS score is unavailable, so the exact risk cannot be quantified. The CVE is not listed in the CISA KEV catalog. The bug operates in a kernel driver that processes firmware data; thus, the likely attack vector would require an attacker to manipulate the firmware response or exploit the driver during normal operation, implying a local or compromised‑system escalation scenario. In the absence of an identified exploit, the risk level is considered low to moderate pending further information.

Generated by OpenCVE AI on May 2, 2026 at 07:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update your Linux kernel to a release that incorporates the bnxt_en fix, such as the latest stable kernel from kernel.org or your distribution's security updates.
  • Ensure that the firmware on any Broadcom NetXtreme‑E adapters is updated to the latest version, since the vulnerability originates from interpreting firmware responses.
  • If an immediate kernel update is not feasible, unload the bnxt_en module or disable the affected network interface to prevent exploitation until a patch can be applied.

Generated by OpenCVE AI on May 2, 2026 at 07:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-823
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 01 May 2026 23:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: bnxt_en: set backing store type from query type bnxt_hwrm_func_backing_store_qcaps_v2() stores resp->type from the firmware response in ctxm->type and later uses that value to index fixed backing-store metadata arrays such as ctx_arr[] and bnxt_bstore_to_trace[]. ctxm->type is fixed by the current backing-store query type and matches the array index of ctx->ctx_arr. Set ctxm->type from the current loop variable instead of depending on resp->type. Also update the loop to advance type from next_valid_type in the for statement, which keeps the control flow simpler for non-valid and unchanged entries.
Title bnxt_en: set backing store type from query type
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:33.260Z

Reserved: 2026-05-01T14:12:55.977Z

Link: CVE-2026-43034

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:48.037

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-43034

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-43034 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:15:16Z

Weaknesses