
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in the Linux kernel (CVE-2025-39947) related to the handling of uplink netdevice access in the net/mlx5e component. The issue was discovered and reported on October 4, 2025, affecting the mlx5_uplink_netdev_get() function which handles uplink netdevice pointer access (NVD).
The vulnerability occurs when the mlx5_uplink_netdev_get() function attempts to access the uplink netdevice pointer from mdev->mlx5e_res.uplink_netdev. The critical issue arises when the netdevice is removed and its pointer is cleared during unbinding from the mlx5_core.eth driver, resulting in a NULL pointer that can cause a kernel panic. This is evidenced by a page fault error at address 0x1300 in the mlx5e_vport_rep_load function (NVD).
When exploited, this vulnerability leads to a kernel panic, causing system instability and potential denial of service. The issue specifically affects the system's networking capabilities through the MLX5 driver component (NVD).
The recommended mitigation involves ensuring the pointer validity before use by implementing NULL checks and using netdev_hold() to maintain a reference to the netdevice, preventing it from being freed while in use. This prevents the occurrence of NULL pointer dereferences and subsequent kernel panics (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."