CVE-2026-43012

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2026
Last modified:
07/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5: Fix switchdev mode rollback in case of failure<br /> <br /> If for some internal reason switchdev mode fails, we rollback to legacy<br /> mode, before this patch, rollback will unregister the uplink netdev and<br /> leave it unregistered causing the below kernel bug.<br /> <br /> To fix this, we need to avoid netdev unregister by setting the proper<br /> rollback flag &amp;#39;MLX5_PRIV_FLAGS_SWITCH_LEGACY&amp;#39; to indicate legacy mode.<br /> <br /> devlink (431) used greatest stack depth: 11048 bytes left<br /> mlx5_core 0000:00:03.0: E-Switch: Disable: mode(LEGACY), nvfs(0), \<br /> necvfs(0), active vports(0)<br /> mlx5_core 0000:00:03.0: E-Switch: Supported tc chains and prios offload<br /> mlx5_core 0000:00:03.0: Loading uplink representor for vport 65535<br /> mlx5_core 0000:00:03.0: mlx5_cmd_out_err:816:(pid 456): \<br /> QUERY_HCA_CAP(0x100) op_mod(0x0) failed, \<br /> status bad parameter(0x3), syndrome (0x3a3846), err(-22)<br /> mlx5_core 0000:00:03.0 enp0s3np0 (unregistered): Unloading uplink \<br /> representor for vport 65535<br /> ------------[ cut here ]------------<br /> kernel BUG at net/core/dev.c:12070!<br /> Oops: invalid opcode: 0000 [#1] SMP NOPTI<br /> CPU: 2 UID: 0 PID: 456 Comm: devlink Not tainted 6.16.0-rc3+ \<br /> #9 PREEMPT(voluntary)<br /> RIP: 0010:unregister_netdevice_many_notify+0x123/0xae0<br /> ...<br /> Call Trace:<br /> [ 90.923094] unregister_netdevice_queue+0xad/0xf0<br /> [ 90.923323] unregister_netdev+0x1c/0x40<br /> [ 90.923522] mlx5e_vport_rep_unload+0x61/0xc6<br /> [ 90.923736] esw_offloads_enable+0x8e6/0x920<br /> [ 90.923947] mlx5_eswitch_enable_locked+0x349/0x430<br /> [ 90.924182] ? is_mp_supported+0x57/0xb0<br /> [ 90.924376] mlx5_devlink_eswitch_mode_set+0x167/0x350<br /> [ 90.924628] devlink_nl_eswitch_set_doit+0x6f/0xf0<br /> [ 90.924862] genl_family_rcv_msg_doit+0xe8/0x140<br /> [ 90.925088] genl_rcv_msg+0x18b/0x290<br /> [ 90.925269] ? __pfx_devlink_nl_pre_doit+0x10/0x10<br /> [ 90.925506] ? __pfx_devlink_nl_eswitch_set_doit+0x10/0x10<br /> [ 90.925766] ? __pfx_devlink_nl_post_doit+0x10/0x10<br /> [ 90.926001] ? __pfx_genl_rcv_msg+0x10/0x10<br /> [ 90.926206] netlink_rcv_skb+0x52/0x100<br /> [ 90.926393] genl_rcv+0x28/0x40<br /> [ 90.926557] netlink_unicast+0x27d/0x3d0<br /> [ 90.926749] netlink_sendmsg+0x1f7/0x430<br /> [ 90.926942] __sys_sendto+0x213/0x220<br /> [ 90.927127] ? __sys_recvmsg+0x6a/0xd0<br /> [ 90.927312] __x64_sys_sendto+0x24/0x30<br /> [ 90.927504] do_syscall_64+0x50/0x1c0<br /> [ 90.927687] entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> [ 90.927929] RIP: 0033:0x7f7d0363e047

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12.9 (including) 6.12.81 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13.1 (including) 6.18.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.12 (excluding)
cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*