The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23438

CVE-2026-23438: Linux Kernel Privilege Escalation Flaw

CVE-2026-23438 is a privilege escalation vulnerability in the Linux kernel's mvpp2 driver that causes NULL pointer dereference. This article covers the technical details, affected versions, impact, and mitigation.

Published: April 10, 2026

CVE-2026-23438 Overview

CVE-2026-23438 is a NULL pointer dereference vulnerability in the Linux kernel's Marvell PPv2 (mvpp2) network driver. The vulnerability exists in the mvpp2_bm_switch_buffers() function which unconditionally calls mvpp2_bm_pool_update_priv_fc() when switching between per-cpu and shared buffer pool modes, without properly checking if the required CM3 SRAM resource is present.

When the CM3 SRAM resource is not defined in the device tree configuration, the priv->cm3_base pointer remains NULL while priv->global_tx_fc is set to false. Any operation that triggers mvpp2_bm_switch_buffers(), such as an MTU change that crosses the jumbo frame threshold, will result in a kernel crash due to dereferencing this NULL pointer through mvpp2_cm3_read() and mvpp2_cm3_write() functions.

Critical Impact

This vulnerability can cause a kernel panic and system crash on affected systems using Marvell PPv2 network hardware when certain network configuration changes are performed.

Affected Products

  • Linux kernel with Marvell PPv2 (mvpp2) network driver enabled
  • Systems using Marvell Armada SoCs with PPv2 network controllers
  • Devices without CM3 SRAM resource defined in device tree configuration

Discovery Timeline

  • April 3, 2026 - CVE-2026-23438 published to NVD
  • April 7, 2026 - Last updated in NVD database

Technical Details for CVE-2026-23438

Vulnerability Analysis

The root cause of this vulnerability lies in the inconsistent handling of flow control hardware access guards within the mvpp2 driver. The mvpp2_bm_switch_buffers() function is the only location in the driver that omits the necessary check for priv->global_tx_fc before attempting to access flow control registers.

When a system operates without the CM3 SRAM memory region (which is added by commit 60523583b07c to the device tree), the priv->cm3_base pointer is never initialized and remains NULL. The driver correctly sets priv->global_tx_fc to false in this configuration, and most code paths properly check this flag before attempting hardware access.

However, the vulnerable mvpp2_bm_switch_buffers() function calls mvpp2_bm_pool_update_priv_fc() without this guard, which in turn calls mvpp2_bm_pool_update_fc() and eventually mvpp2_cm3_read(). This function attempts to perform a readl() operation on the NULL priv->cm3_base pointer, triggering a kernel NULL pointer dereference.

Root Cause

The vulnerability stems from a missing guard condition check in the mvpp2_bm_switch_buffers() function. While every other flow control call site in the driver guards hardware access with either priv->global_tx_fc or port->tx_fc flags, this particular function unconditionally calls the flow control update functions. The fix adds the missing priv->global_tx_fc guard to both the disable and re-enable calls in mvpp2_bm_switch_buffers(), maintaining consistency with the rest of the driver implementation.

Attack Vector

This vulnerability is triggered locally through network configuration changes. The most common trigger is an MTU change that crosses the jumbo frame threshold, which initiates the buffer switching operation. The attack vector requires local access to modify network interface parameters. Since this results in a denial of service (kernel crash) rather than code execution, the primary impact is system availability.

The crash call trace reveals the execution path:

  • dev_set_mtu() or similar network configuration call
  • mvpp2_change_mtu()
  • mvpp2_bm_switch_buffers.isra.0()
  • mvpp2_bm_pool_update_priv_fc()
  • mvpp2_bm_pool_update_fc()
  • mvpp2_cm3_read.isra.0()
  • readl() - NULL pointer dereference occurs here

Detection Methods for CVE-2026-23438

Indicators of Compromise

  • Kernel panic logs containing NULL pointer dereference at virtual address 0000000000000000
  • Crash traces showing readl+0x0/0x18 in the program counter
  • Call traces referencing mvpp2_cm3_read, mvpp2_bm_pool_update_fc, or mvpp2_bm_switch_buffers functions
  • System crashes occurring during MTU changes on Marvell PPv2 network interfaces

Detection Strategies

  • Monitor kernel logs for Data Abort (DABT) exceptions with ESR value 0x0000000096000006 and EC value 0x25
  • Implement watchdog monitoring for unexpected system reboots following network configuration changes
  • Review device tree configurations to identify systems without CM3 SRAM resource definitions
  • Use kernel crash dump analysis tools to identify NULL pointer dereferences in the mvpp2 driver

Monitoring Recommendations

  • Enable kernel crash dump collection (kdump) to capture diagnostic information when crashes occur
  • Monitor network interface configuration events, particularly MTU changes on mvpp2 interfaces
  • Implement system uptime monitoring to detect unexpected reboots on affected platforms
  • Review kernel logs for warnings or errors related to the mvpp2 driver during system initialization

How to Mitigate CVE-2026-23438

Immediate Actions Required

  • Apply the kernel patch from the official Linux kernel stable branches immediately
  • Avoid changing MTU settings on affected network interfaces until patched
  • Verify device tree configurations and consider adding CM3 SRAM resource definitions if hardware supports it
  • Plan maintenance windows for kernel updates on production systems

Patch Information

The Linux kernel team has released patches across multiple stable branches to address this vulnerability. The fix adds the missing priv->global_tx_fc guard to both the disable and re-enable calls in mvpp2_bm_switch_buffers(), ensuring consistent behavior with the rest of the driver.

Available patches:

  • Kernel Git Commit 7bd20f4
  • Kernel Git Commit 7df2b50
  • Kernel Git Commit 8a63baa
  • Kernel Git Commit 8baced5
  • Kernel Git Commit da089f7
  • Kernel Git Commit ff0c54f

Workarounds

  • Avoid MTU changes that cross the jumbo frame threshold on systems using mvpp2 driver without CM3 SRAM
  • If hardware supports it, update device tree to include the CM3 SRAM memory resource definition
  • Consider temporarily using alternative network interfaces until the kernel can be patched
  • Implement change management controls to prevent inadvertent network configuration changes on affected systems
bash
# Check if your system uses the mvpp2 driver
lsmod | grep mvpp2

# Verify current kernel version
uname -r

# Check device tree for CM3 SRAM resource (on affected platforms)
cat /sys/firmware/devicetree/base/*/ethernet@*/reg | hexdump -C

# Monitor for kernel crashes related to mvpp2
dmesg | grep -i "mvpp2\|null pointer"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.03%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Git Commit 7bd20f4

  • Kernel Git Commit 7df2b50

  • Kernel Git Commit 8a63baa

  • Kernel Git Commit 8baced5

  • Kernel Git Commit da089f7

  • Kernel Git Commit ff0c54f
  • Related CVEs
  • CVE-2026-31411: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23439: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23437: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-31398: Linux Kernel Privilege Escalation Bug
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English