Impact
The vulnerability arises in the Linux kernel’s MVPP2 network driver when the driver attempts to switch buffer pools during operations such as changing the MTU past the jumbo frame threshold. A missing null‐pointer check allows the code to dereference a NULL cm3_base pointer, causing a kernel panic. The impact is a system crash, leading to a denial of service and loss of all network services on the affected machine.
Affected Systems
Linux kernels that include the MVPP2 driver, particularly systems using Marvell Ethernet devices that rely on the MVPP2 packet processor. The issue exists in kernel versions prior to the inclusion of the fix that adds a guard for priv->global_tx_fc and the CM3 SRAM resource entry in the device tree.
Risk and Exploitability
The flaw is exploitable locally by an attacker with privileged control who can trigger an MTU change or any operation that forces the driver to switch buffer pools. No remote attack path is evident from the description. The severity is high due to the complete system crash, and while the EPSS score is unavailable and the vulnerability is not listed in KEV, the local nature of the attack combined with halted services suggests a critical risk if the system’s kernel is not updated.
OpenCVE Enrichment