CVE-2026-22996
BaseFortify
Publication date: 2026-01-25
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.12 (inc) to 6.12.67 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.7 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's mlx5e driver where an unstable structure called mlx5e_priv is improperly stored in mlx5e_dev devlink private data. If profile attaching fails, mlx5e_priv can be zeroed out (memset(0)), but it is still referenced, leading to a kernel NULL pointer dereference (kernel oops) during device removal (mlx5e_remove). The fix involves storing the netdev directly instead of mlx5e_priv to avoid referencing invalid memory.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (kernel oops) when the mlx5e driver fails to change or rollback network device profiles, potentially leading to system instability or denial of service on affected systems using the mlx5 driver for network devices.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing error messages and kernel oops logs related to mlx5e device operations. Specifically, running the command `devlink dev eswitch set pci/0000:00:03.0 mode switchdev` may produce errors such as 'mlx5_core: Failed setting eswitch to offloads.' Checking the kernel log with `dmesg` will show messages like 'mlx5e_priv_init failed, err=-12' and workqueue failures. Additionally, running `devlink dev reload pci/0000:00:03.0` may cause a kernel oops with a NULL pointer dereference in mlx5e_remove. Monitoring these commands and logs can help detect the presence of this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves avoiding operations that trigger the vulnerability, such as setting the eswitch mode to switchdev or reloading the mlx5 device using devlink commands that cause the kernel oops. Applying the kernel patch that fixes the handling of mlx5e_priv by storing netdev directly into mlx5e_dev instead of mlx5e_priv is necessary. Until the patch is applied, refrain from changing eswitch profiles or reloading mlx5 devices to prevent kernel crashes.