CVE-2026-23084

In the Linux kernel, the following vulnerability has been resolved: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list When the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is set to false, the driver may request the PMAC_ID from the firmware of the network card, and this function will store that PMAC_ID at the provided address pmac_id. This is the contract of this function. However, there is a location within the driver where both pmac_id_valid == false and pmac_id == NULL are being passed. This could result in dereferencing a NULL pointer. To resolve this issue, it is necessary to pass the address of a stub variable to the function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

17 Mar 2026, 21:10

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: be2net: Corrección de desreferencia de puntero NULL en be_cmd_get_mac_from_list Cuando el argumento del parámetro pmac_id_valid de be_cmd_get_mac_from_list() se establece en falso, el controlador puede solicitar el PMAC_ID del firmware de la tarjeta de red, y esta función almacenará ese PMAC_ID en la dirección pmac_id proporcionada. Este es el contrato de esta función. Sin embargo, existe una ubicación dentro del controlador donde se están pasando tanto pmac_id_valid == false como pmac_id == NULL. Esto podría resultar en la desreferencia de un puntero NULL. Para resolver este problema, es necesario pasar la dirección de una variable auxiliar a la función.
References () https://git.kernel.org/stable/c/31410a01a86bcb98c798d01061abf1f789c4f75a - () https://git.kernel.org/stable/c/31410a01a86bcb98c798d01061abf1f789c4f75a - Patch
References () https://git.kernel.org/stable/c/47ffb4dcffe336f4a7bd0f3284be7aadc6484698 - () https://git.kernel.org/stable/c/47ffb4dcffe336f4a7bd0f3284be7aadc6484698 - Patch
References () https://git.kernel.org/stable/c/4cba480c9b9a3861a515262225cb53a1f5978344 - () https://git.kernel.org/stable/c/4cba480c9b9a3861a515262225cb53a1f5978344 - Patch
References () https://git.kernel.org/stable/c/6c3e00888dbec887125a08b51a705b9b163fcdd1 - () https://git.kernel.org/stable/c/6c3e00888dbec887125a08b51a705b9b163fcdd1 - Patch
References () https://git.kernel.org/stable/c/8215794403d264739cc676668087512950b2ff31 - () https://git.kernel.org/stable/c/8215794403d264739cc676668087512950b2ff31 - Patch
References () https://git.kernel.org/stable/c/92c6dc181a18e6e0ddb872ed35cb48a9274829e4 - () https://git.kernel.org/stable/c/92c6dc181a18e6e0ddb872ed35cb48a9274829e4 - Patch
References () https://git.kernel.org/stable/c/e206fb415db36bad52bb90c08d46ce71ffbe8a80 - () https://git.kernel.org/stable/c/e206fb415db36bad52bb90c08d46ce71ffbe8a80 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-476

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/4cba480c9b9a3861a515262225cb53a1f5978344 -
  • () https://git.kernel.org/stable/c/6c3e00888dbec887125a08b51a705b9b163fcdd1 -
  • () https://git.kernel.org/stable/c/92c6dc181a18e6e0ddb872ed35cb48a9274829e4 -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-03-17 21:10


NVD link : CVE-2026-23084

Mitre link : CVE-2026-23084

CVE.ORG link : CVE-2026-23084


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference