{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-40264","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T07:20:57.183Z","datePublished":"2025-12-04T16:08:24.028Z","dateUpdated":"2026-05-11T21:45:58.691Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:45:58.691Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: pass wrb_params in case of OS2BMC\n\nbe_insert_vlan_in_pkt() is called with the wrb_params argument being NULL\nat be_send_pkt_to_bmc() call site.  This may lead to dereferencing a NULL\npointer when processing a workaround for specific packet, as commit\nbc0c3405abbb (\"be2net: fix a Tx stall bug caused by a specific ipv6\npacket\") states.\n\nThe correct way would be to pass the wrb_params from be_xmit()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/emulex/benet/be_main.c"],"versions":[{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"48d59b60dd5d7e4c48c077a2008c9dcd7b59bdfe","status":"affected","versionType":"git"},{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"f499dfa5c98e92e72dd454eb95a1000a448f3405","status":"affected","versionType":"git"},{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"630360c6724e27f1aa494ba3fffe1e38c4205284","status":"affected","versionType":"git"},{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"012ee5882b1830db469194466a210768ed207388","status":"affected","versionType":"git"},{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"ce0a3699244aca3acb659f143c9cb1327b210f89","status":"affected","versionType":"git"},{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"1ecd86ec6efddb59a10c927e8e679f183bb9113e","status":"affected","versionType":"git"},{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"4c4741f6e7f2fa4e1486cb61e1c15b9236ec134d","status":"affected","versionType":"git"},{"version":"760c295e0e8d982917d004c9095cff61c0cbd803","lessThan":"7d277a7a58578dd62fd546ddaef459ec24ccae36","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/emulex/benet/be_main.c"],"versions":[{"version":"4.2","status":"affected"},{"version":"0","lessThan":"4.2","status":"unaffected","versionType":"semver"},{"version":"5.4.302","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.247","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.197","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.159","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.118","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.60","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.17.10","lessThanOrEqual":"6.17.*","status":"unaffected","versionType":"semver"},{"version":"6.18","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"5.4.302"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"5.10.247"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"5.15.197"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.1.159"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.6.118"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.12.60"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.17.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.18"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/48d59b60dd5d7e4c48c077a2008c9dcd7b59bdfe"},{"url":"https://git.kernel.org/stable/c/f499dfa5c98e92e72dd454eb95a1000a448f3405"},{"url":"https://git.kernel.org/stable/c/630360c6724e27f1aa494ba3fffe1e38c4205284"},{"url":"https://git.kernel.org/stable/c/012ee5882b1830db469194466a210768ed207388"},{"url":"https://git.kernel.org/stable/c/ce0a3699244aca3acb659f143c9cb1327b210f89"},{"url":"https://git.kernel.org/stable/c/1ecd86ec6efddb59a10c927e8e679f183bb9113e"},{"url":"https://git.kernel.org/stable/c/4c4741f6e7f2fa4e1486cb61e1c15b9236ec134d"},{"url":"https://git.kernel.org/stable/c/7d277a7a58578dd62fd546ddaef459ec24ccae36"}],"title":"be2net: pass wrb_params in case of OS2BMC","x_generator":{"engine":"bippy-1.2.0"}}}}