net/mlx5: lag: Check for LAG device before creating debugfs

Summary

CVECVE-2026-43013
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-01 15:16:45 UTC
Updated2026-05-01 15:24:14 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: net/mlx5: lag: Check for LAG device before creating debugfs __mlx5_lag_dev_add_mdev() may return 0 (success) even when an error occurs that is handled gracefully. Consequently, the initialization flow proceeds to call mlx5_ldev_add_debugfs() even when there is no valid LAG context. mlx5_ldev_add_debugfs() blindly created the debugfs directory and attributes. This exposed interfaces (like the members file) that rely on a valid ldev pointer, leading to potential NULL pointer dereferences if accessed when ldev is NULL. Add a check to verify that mlx5_lag_dev(dev) returns a valid pointer before attempting to create the debugfs entries.

Risk And Classification

EPSS: 0.000240000 probability, percentile 0.067950000 (date 2026-05-04)

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 7f46a0b7327ae261f9981888708dbca22c283900 a3db46d5f4df92630a96f7bc77b60e75c2353e06 git Not specified
CNA Linux Linux affected 7f46a0b7327ae261f9981888708dbca22c283900 7129632cab3e4d23510b21930aa73b8d97a859f5 git Not specified
CNA Linux Linux affected 7f46a0b7327ae261f9981888708dbca22c283900 cfa774e6c920c81e700327bf10db8cb50d5db456 git Not specified
CNA Linux Linux affected 7f46a0b7327ae261f9981888708dbca22c283900 c53cf44588a93000f71817a6bb87a66353c48dee git Not specified
CNA Linux Linux affected 7f46a0b7327ae261f9981888708dbca22c283900 89c65f2fcd8801365b410f40a427cbcd7f4c28e9 git Not specified
CNA Linux Linux affected 7f46a0b7327ae261f9981888708dbca22c283900 bf16bca6653679d8a514d6c1c5a2c67065033f14 git Not specified
CNA Linux Linux affected 5.19 Not specified
CNA Linux Linux unaffected 5.19 semver Not specified
CNA Linux Linux unaffected 6.1.168 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.134 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.81 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.22 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.12 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/bf16bca6653679d8a514d6c1c5a2c67065033f14 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/89c65f2fcd8801365b410f40a427cbcd7f4c28e9 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/a3db46d5f4df92630a96f7bc77b60e75c2353e06 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/cfa774e6c920c81e700327bf10db8cb50d5db456 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/c53cf44588a93000f71817a6bb87a66353c48dee 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/7129632cab3e4d23510b21930aa73b8d97a859f5 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report