Impact
The vulnerability arises in the Linux mlx5e network device driver when it passes an invalid "priv" pointer to mlx5e_destroy_netdev, which can be zeroed during failed profile attachments. This results in a NULL pointer dereference that causes the kernel to Oops during device removal or devlink reload operations. The crash leads to a loss of kernel stability and effectively brings the affected system down.
Affected Systems
This issue affects Linux kernel builds that incorporate the mlx5e driver. The patch is present in mainline kernel commits referenced in the advisory but not yet available in older kernel releases. Users running Linux kernel versions prior to the commit, especially with switchdev mode enabled, are impacted.
Risk and Exploitability
The bug has a CVSS score of 7.0 indicating moderate severity. Exploitation requires local access to the system because the bug is triggered by administrative devlink commands or by a failure in switchdev configuration. EPSS suggests few chances of exploitation. The vulnerability is not listed in the CISA KEV catalog, implying it is not yet widely exploited. Administrators should consider the kernel crash as a denial of service and are encouraged to update kernels to include the patch.
OpenCVE Enrichment
Debian DSA