CVE-2026-23041Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 4

Description

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup When bnxt_init_one() fails during initialization (e.g., bnxt_init_int_mode returns -ENODEV), the error path calls bnxt_free_hwrm_resources() which destroys the DMA pool and sets bp->hwrm_dma_pool to NULL. Subsequently, bnxt_ptp_clear() is called, which invokes ptp_clock_unregister(). Since commit a60fc3294a37 ("ptp: rework ptp_clock_unregister() to disabl

Affected Packages4 packages

Linuxlinux/linux_kernel6.18.06.18.6
Debianlinux/linux_kernel< 6.18.8-1
CVEListV5linux/linuxa60fc3294a377204664b5484e4a487fa124155da0174d5466caefc22f03a36c43b2a3cce7e332627+2
debiandebian/linux< linux 6.18.8-1 (forky)

🔴Vulnerability Details

3
OSV
CVE-2026-23041: In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup When bnxt_2026-02-04
GHSA
GHSA-f2r6-xf7j-hxvf: In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup When bnx2026-02-04
OSV
bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup2026-02-04

📋Vendor Advisories

2
Red Hat
kernel: bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup2026-02-04
Debian
CVE-2026-23041: linux - In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fi...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23041 Impact, Exploitability, and Mitigation Steps | Wiz