CVE-2026-23035
BaseFortify
Publication date: 2026-01-31
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mlx | mlx5e | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a kernel oops (crash) in the Linux kernel's mlx5e driver, which handles Mellanox network devices. It occurs when the switchdev mode fails due to a profile change failure. The issue arises because the mlx5e_priv structure can be zeroed out (memset(0)) if profile attaching fails, leading to invalid memory access during cleanup in mlx5e_remove. The fix involves passing a valid netdev pointer to mlx5e_destroy_netdev and checking the validity of priv->profile before cleanup to prevent the kernel from dereferencing a NULL pointer and crashing.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel oops) when the mlx5e driver attempts to remove a network device after a failed profile change in switchdev mode. This can lead to system instability, potential downtime, and disruption of network services on affected systems using Mellanox mlx5e devices.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing error messages related to mlx5e in the system logs, especially when attempting to set the eswitch mode to switchdev or reload the device. Commands such as 'devlink dev eswitch set pci/0000:00:03.0 mode switchdev' may produce errors like 'mlx5_core: Failed setting eswitch to offloads.' Additionally, checking the kernel log with 'dmesg' for messages including 'mlx5e_priv_init failed', 'Failed to create a rescuer kthread for wq "mlx5e"', or kernel oops related to mlx5e_remove can indicate the presence of this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves avoiding operations that trigger the mlx5e_remove function when the profile attaching fails, such as not setting the eswitch mode to switchdev or reloading the device until the kernel is updated with the fix. Monitoring for the specific error messages and kernel oops can help avoid unstable states. Ultimately, applying the kernel patch that passes netdev to mlx5e_destroy_netdev and checks the validity of priv->profile before cleanup will resolve the issue.