CVE-2026-43199
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
11/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query<br />
<br />
Fix a "scheduling while atomic" bug in mlx5e_ipsec_init_macs() by<br />
replacing mlx5_query_mac_address() with ether_addr_copy() to get the<br />
local MAC address directly from netdev->dev_addr.<br />
<br />
The issue occurs because mlx5_query_mac_address() queries the hardware<br />
which involves mlx5_cmd_exec() that can sleep, but it is called from<br />
the mlx5e_ipsec_handle_event workqueue which runs in atomic context.<br />
<br />
The MAC address is already available in netdev->dev_addr, so no need<br />
to query hardware. This avoids the sleeping call and resolves the bug.<br />
<br />
Call trace:<br />
BUG: scheduling while atomic: kworker/u112:2/69344/0x00000200<br />
__schedule+0x7ab/0xa20<br />
schedule+0x1c/0xb0<br />
schedule_timeout+0x6e/0xf0<br />
__wait_for_common+0x91/0x1b0<br />
cmd_exec+0xa85/0xff0 [mlx5_core]<br />
mlx5_cmd_exec+0x1f/0x50 [mlx5_core]<br />
mlx5_query_nic_vport_mac_address+0x7b/0xd0 [mlx5_core]<br />
mlx5_query_mac_address+0x19/0x30 [mlx5_core]<br />
mlx5e_ipsec_init_macs+0xc1/0x720 [mlx5_core]<br />
mlx5e_ipsec_build_accel_xfrm_attrs+0x422/0x670 [mlx5_core]<br />
mlx5e_ipsec_handle_event+0x2b9/0x460 [mlx5_core]<br />
process_one_work+0x178/0x2e0<br />
worker_thread+0x2ea/0x430
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.12.75 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.16 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.6 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



