Impact
This vulnerability occurs in the mlx5e networking driver when a profile change operation fails and the rollback to the previous profile also fails. The code then dereferences a NULL pointer stored in the device private data, causing a kernel oops and a system crash. The crash can lead to denial of service, as affected hosts will reboot or become unresponsive until restarted. The flaw is a NULL pointer dereference (CWE-476).
Affected Systems
Vulnerable configurations are Linux kernel builds that include the mlx5e driver before the patch is applied, specifically kernel 6.19 release candidates 1 through 5 (6.19rc1–6.19rc5). Systems using Mellanox or ConnectX-5 adapters that rely on mlx5e for switchdev functionality are impacted. Any distribution shipping these kernels without the upstream fix is affected.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity and the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog. Exploitation requires the ability to change or enable switchdev mode, implying at least local or kernel‑level privileges, and would only crash the host without providing further compromise. Administrators should consider applying the kernel update promptly.
OpenCVE Enrichment
Debian DSA