CVE-2026-43012
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2026
Last modified:
07/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5: Fix switchdev mode rollback in case of failure<br />
<br />
If for some internal reason switchdev mode fails, we rollback to legacy<br />
mode, before this patch, rollback will unregister the uplink netdev and<br />
leave it unregistered causing the below kernel bug.<br />
<br />
To fix this, we need to avoid netdev unregister by setting the proper<br />
rollback flag &#39;MLX5_PRIV_FLAGS_SWITCH_LEGACY&#39; to indicate legacy mode.<br />
<br />
devlink (431) used greatest stack depth: 11048 bytes left<br />
mlx5_core 0000:00:03.0: E-Switch: Disable: mode(LEGACY), nvfs(0), \<br />
necvfs(0), active vports(0)<br />
mlx5_core 0000:00:03.0: E-Switch: Supported tc chains and prios offload<br />
mlx5_core 0000:00:03.0: Loading uplink representor for vport 65535<br />
mlx5_core 0000:00:03.0: mlx5_cmd_out_err:816:(pid 456): \<br />
QUERY_HCA_CAP(0x100) op_mod(0x0) failed, \<br />
status bad parameter(0x3), syndrome (0x3a3846), err(-22)<br />
mlx5_core 0000:00:03.0 enp0s3np0 (unregistered): Unloading uplink \<br />
representor for vport 65535<br />
------------[ cut here ]------------<br />
kernel BUG at net/core/dev.c:12070!<br />
Oops: invalid opcode: 0000 [#1] SMP NOPTI<br />
CPU: 2 UID: 0 PID: 456 Comm: devlink Not tainted 6.16.0-rc3+ \<br />
#9 PREEMPT(voluntary)<br />
RIP: 0010:unregister_netdevice_many_notify+0x123/0xae0<br />
...<br />
Call Trace:<br />
[ 90.923094] unregister_netdevice_queue+0xad/0xf0<br />
[ 90.923323] unregister_netdev+0x1c/0x40<br />
[ 90.923522] mlx5e_vport_rep_unload+0x61/0xc6<br />
[ 90.923736] esw_offloads_enable+0x8e6/0x920<br />
[ 90.923947] mlx5_eswitch_enable_locked+0x349/0x430<br />
[ 90.924182] ? is_mp_supported+0x57/0xb0<br />
[ 90.924376] mlx5_devlink_eswitch_mode_set+0x167/0x350<br />
[ 90.924628] devlink_nl_eswitch_set_doit+0x6f/0xf0<br />
[ 90.924862] genl_family_rcv_msg_doit+0xe8/0x140<br />
[ 90.925088] genl_rcv_msg+0x18b/0x290<br />
[ 90.925269] ? __pfx_devlink_nl_pre_doit+0x10/0x10<br />
[ 90.925506] ? __pfx_devlink_nl_eswitch_set_doit+0x10/0x10<br />
[ 90.925766] ? __pfx_devlink_nl_post_doit+0x10/0x10<br />
[ 90.926001] ? __pfx_genl_rcv_msg+0x10/0x10<br />
[ 90.926206] netlink_rcv_skb+0x52/0x100<br />
[ 90.926393] genl_rcv+0x28/0x40<br />
[ 90.926557] netlink_unicast+0x27d/0x3d0<br />
[ 90.926749] netlink_sendmsg+0x1f7/0x430<br />
[ 90.926942] __sys_sendto+0x213/0x220<br />
[ 90.927127] ? __sys_recvmsg+0x6a/0xd0<br />
[ 90.927312] __x64_sys_sendto+0x24/0x30<br />
[ 90.927504] do_syscall_64+0x50/0x1c0<br />
[ 90.927687] entry_SYSCALL_64_after_hwframe+0x76/0x7e<br />
[ 90.927929] RIP: 0033:0x7f7d0363e047
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.9 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13.1 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



