CVE-2023-54156
NULL Pointer Dereference in Linux sfc Driver Causes Kernel Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's sfc driver where a NULL pointer dereference can happen when reading network interface card (NIC) statistics during a NIC reset. Specifically, the function efx_net_stats() can be called during an ethtool selftest while the NIC is being finalized (fini'd), causing the mc_stats pointer to be NULL. Attempting to fetch stats from hardware in this state causes a kernel crash due to a NULL pointer dereference. The fix involves skipping the hardware stats read in this scenario to avoid the crash and using locking to prevent race conditions.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when reading NIC statistics during a NIC reset, leading to system instability or downtime. This can disrupt network operations and affect the availability of services running on the affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the sfc driver has been fixed to avoid crashes when reading stats during NIC reset. Avoid running ethtool selftests on affected NICs until the fix is applied.