Impact
The flaw is a null pointer dereference in the Linux kernel’s mlx5e_remove function that occurs when a switchdev mode change fails. The code mistakenly stores a reference that becomes invalid, and the function dereferences it during cleanup, causing the kernel to oops and crash. This leads to a denial of service because the entire system becomes unstable. The underlying weakness is CWE-476.
Affected Systems
Linux systems running the vulnerable mlx5e driver component. The CPE data shows affected kernels include generic Linux kernel versions and specific 6.19 release candidates 1 through 5. Any deployment with the mlx5e module built into or loaded on these kernels is susceptible.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score of less than 1% signals a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. The flaw requires local privileged execution to trigger the devlink command that forces a failed profile change and triggers the crash. Overall the risk is moderate but the real‑world exploitation probability remains low without a patch.
OpenCVE Enrichment
Debian DSA