CVE-2026-23084
NULL Pointer Dereference in Linux be2net Driver Network Component
Publication date: 2026-02-04
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 3.12 (inc) to 5.10.249 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's be2net driver. Specifically, it involves the function be_cmd_get_mac_from_list(). When the parameter pmac_id_valid is set to false, the function requests a PMAC_ID from the network card's firmware and stores it at the address provided by pmac_id. However, there is a flaw where the function is called with pmac_id_valid set to false and pmac_id set to NULL, which leads to a NULL pointer dereference.
Dereferencing a NULL pointer can cause the system to crash or behave unpredictably. The fix involves passing the address of a stub variable instead of NULL to prevent this issue.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel driver, which may lead to system crashes or instability. Such crashes can result in denial of service, affecting the availability of the affected system or network device.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know