CVE-2026-23000NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 25

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile change rollback failure mlx5e_netdev_change_profile can fail to attach a new profile and can fail to rollback to old profile, in such case, we could end up with a dangling netdev with a fully reset netdev_priv. A retry to change profile, e.g. another attempt to call mlx5e_netdev_change_profile via switchdev mode change, will crash trying to access the now NULL priv->mdev. This fix allows mlx5e_

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.126.12.67+2
Debianlinux/linux_kernel< 6.12.69-1+1
CVEListV5linux/linuxc4d7eb57687f358cd498ea3624519236af8db97edad52950b409d6923880d65a4cddb383286e17d2+3
debiandebian/linux< linux 6.18.8-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2026-23000: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile change rollback failure mlx5e_netdev_change_profil2026-01-25
GHSA
GHSA-hg87-qqvm-4pr4: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile change rollback failure mlx5e_netdev_change_prof2026-01-25

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel (mlx5e): Denial of Service due to NULL pointer dereference during network profile change2026-01-25
Debian
CVE-2026-23000: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23000 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23000 — NULL Pointer Dereference in Linux | cvebase