{"api_version":"1","generated_at":"2026-05-12T15:57:02+00:00","cve":"CVE-2026-43468","urls":{"html":"https://cve.report/CVE-2026-43468","api":"https://cve.report/api/cve/CVE-2026-43468.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43468","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43468"},"summary":{"title":"net/mlx5: Fix deadlock between devlink lock and esw->wq","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix deadlock between devlink lock and esw->wq\n\nesw->work_queue executes esw_functions_changed_event_handler ->\nesw_vfs_changed_event_handler and acquires the devlink lock.\n\n.eswitch_mode_set (acquires devlink lock in devlink_nl_pre_doit) ->\nmlx5_devlink_eswitch_mode_set -> mlx5_eswitch_disable_locked ->\nmlx5_eswitch_event_handler_unregister -> flush_workqueue deadlocks\nwhen esw_vfs_changed_event_handler executes.\n\nFix that by no longer flushing the work to avoid the deadlock, and using\na generation counter to keep track of work relevance. This avoids an old\nhandler manipulating an esw that has undergone one or more mode changes:\n- the counter is incremented in mlx5_eswitch_event_handler_unregister.\n- the counter is read and passed to the ephemeral mlx5_host_work struct.\n- the work handler takes the devlink lock and bails out if the current\n  generation is different than the one it was scheduled to operate on.\n- mlx5_eswitch_cleanup does the final draining before destroying the wq.\n\nNo longer flushing the workqueue has the side effect of maybe no longer\ncancelling pending vport_change_handler work items, but that's ok since\nthose are disabled elsewhere:\n- mlx5_eswitch_disable_locked disables the vport eq notifier.\n- mlx5_esw_vport_disable disarms the HW EQ notification and marks\n  vport->enabled under state_lock to false to prevent pending vport\n  handler from doing anything.\n- mlx5_eswitch_cleanup destroys the workqueue and makes sure all events\n  are disabled/finished.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 15:16:59","updated_at":"2026-05-12 14:10:27"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/3c7313cb41b1b427078440364d2f042c276a1c0b","name":"https://git.kernel.org/stable/c/3c7313cb41b1b427078440364d2f042c276a1c0b","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/957d2a58f7f8ebcbdd0a85935e0d2675134b890d","name":"https://git.kernel.org/stable/c/957d2a58f7f8ebcbdd0a85935e0d2675134b890d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/4a7838bebc38374f74baaf88bf2cf8d439a92923","name":"https://git.kernel.org/stable/c/4a7838bebc38374f74baaf88bf2cf8d439a92923","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/0de867f6e34eae6907b367fd152c55e61cb98608","name":"https://git.kernel.org/stable/c/0de867f6e34eae6907b367fd152c55e61cb98608","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/90e7e5d14d0bd25ffd019a3aa39d9f1c05fedbe1","name":"https://git.kernel.org/stable/c/90e7e5d14d0bd25ffd019a3aa39d9f1c05fedbe1","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/aed763abf0e905b4b8d747d1ba9e172961572f57","name":"https://git.kernel.org/stable/c/aed763abf0e905b4b8d747d1ba9e172961572f57","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43468","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43468","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f1bc646c9a06f09aad5d8bacb87103b5573ee45e 0de867f6e34eae6907b367fd152c55e61cb98608 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f1bc646c9a06f09aad5d8bacb87103b5573ee45e 957d2a58f7f8ebcbdd0a85935e0d2675134b890d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f1bc646c9a06f09aad5d8bacb87103b5573ee45e 3c7313cb41b1b427078440364d2f042c276a1c0b git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f1bc646c9a06f09aad5d8bacb87103b5573ee45e 4a7838bebc38374f74baaf88bf2cf8d439a92923 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f1bc646c9a06f09aad5d8bacb87103b5573ee45e 90e7e5d14d0bd25ffd019a3aa39d9f1c05fedbe1 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f1bc646c9a06f09aad5d8bacb87103b5573ee45e aed763abf0e905b4b8d747d1ba9e172961572f57 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.0","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.0 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.167 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.130 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.78 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.19 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.9 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43468","cve":"CVE-2026-43468","epss":"0.000240000","percentile":"0.070210000","score_date":"2026-05-11","updated_at":"2026-05-12 00:01:17"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/net/ethernet/mellanox/mlx5/core/eswitch.c","drivers/net/ethernet/mellanox/mlx5/core/eswitch.h","drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"0de867f6e34eae6907b367fd152c55e61cb98608","status":"affected","version":"f1bc646c9a06f09aad5d8bacb87103b5573ee45e","versionType":"git"},{"lessThan":"957d2a58f7f8ebcbdd0a85935e0d2675134b890d","status":"affected","version":"f1bc646c9a06f09aad5d8bacb87103b5573ee45e","versionType":"git"},{"lessThan":"3c7313cb41b1b427078440364d2f042c276a1c0b","status":"affected","version":"f1bc646c9a06f09aad5d8bacb87103b5573ee45e","versionType":"git"},{"lessThan":"4a7838bebc38374f74baaf88bf2cf8d439a92923","status":"affected","version":"f1bc646c9a06f09aad5d8bacb87103b5573ee45e","versionType":"git"},{"lessThan":"90e7e5d14d0bd25ffd019a3aa39d9f1c05fedbe1","status":"affected","version":"f1bc646c9a06f09aad5d8bacb87103b5573ee45e","versionType":"git"},{"lessThan":"aed763abf0e905b4b8d747d1ba9e172961572f57","status":"affected","version":"f1bc646c9a06f09aad5d8bacb87103b5573ee45e","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/net/ethernet/mellanox/mlx5/core/eswitch.c","drivers/net/ethernet/mellanox/mlx5/core/eswitch.h","drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.0"},{"lessThan":"6.0","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.167","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.130","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.78","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.19","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.9","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.167","versionStartIncluding":"6.0","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.130","versionStartIncluding":"6.0","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.78","versionStartIncluding":"6.0","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.19","versionStartIncluding":"6.0","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.9","versionStartIncluding":"6.0","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.0","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix deadlock between devlink lock and esw->wq\n\nesw->work_queue executes esw_functions_changed_event_handler ->\nesw_vfs_changed_event_handler and acquires the devlink lock.\n\n.eswitch_mode_set (acquires devlink lock in devlink_nl_pre_doit) ->\nmlx5_devlink_eswitch_mode_set -> mlx5_eswitch_disable_locked ->\nmlx5_eswitch_event_handler_unregister -> flush_workqueue deadlocks\nwhen esw_vfs_changed_event_handler executes.\n\nFix that by no longer flushing the work to avoid the deadlock, and using\na generation counter to keep track of work relevance. This avoids an old\nhandler manipulating an esw that has undergone one or more mode changes:\n- the counter is incremented in mlx5_eswitch_event_handler_unregister.\n- the counter is read and passed to the ephemeral mlx5_host_work struct.\n- the work handler takes the devlink lock and bails out if the current\n  generation is different than the one it was scheduled to operate on.\n- mlx5_eswitch_cleanup does the final draining before destroying the wq.\n\nNo longer flushing the workqueue has the side effect of maybe no longer\ncancelling pending vport_change_handler work items, but that's ok since\nthose are disabled elsewhere:\n- mlx5_eswitch_disable_locked disables the vport eq notifier.\n- mlx5_esw_vport_disable disarms the HW EQ notification and marks\n  vport->enabled under state_lock to false to prevent pending vport\n  handler from doing anything.\n- mlx5_eswitch_cleanup destroys the workqueue and makes sure all events\n  are disabled/finished."}],"providerMetadata":{"dateUpdated":"2026-05-11T22:25:11.471Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/0de867f6e34eae6907b367fd152c55e61cb98608"},{"url":"https://git.kernel.org/stable/c/957d2a58f7f8ebcbdd0a85935e0d2675134b890d"},{"url":"https://git.kernel.org/stable/c/3c7313cb41b1b427078440364d2f042c276a1c0b"},{"url":"https://git.kernel.org/stable/c/4a7838bebc38374f74baaf88bf2cf8d439a92923"},{"url":"https://git.kernel.org/stable/c/90e7e5d14d0bd25ffd019a3aa39d9f1c05fedbe1"},{"url":"https://git.kernel.org/stable/c/aed763abf0e905b4b8d747d1ba9e172961572f57"}],"title":"net/mlx5: Fix deadlock between devlink lock and esw->wq","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43468","datePublished":"2026-05-08T14:22:28.889Z","dateReserved":"2026-05-01T14:12:56.011Z","dateUpdated":"2026-05-11T22:25:11.471Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 15:16:59","lastModifiedDate":"2026-05-12 14:10:27","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43468","Ordinal":"1","Title":"net/mlx5: Fix deadlock between devlink lock and esw->wq","CVE":"CVE-2026-43468","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43468","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix deadlock between devlink lock and esw->wq\n\nesw->work_queue executes esw_functions_changed_event_handler ->\nesw_vfs_changed_event_handler and acquires the devlink lock.\n\n.eswitch_mode_set (acquires devlink lock in devlink_nl_pre_doit) ->\nmlx5_devlink_eswitch_mode_set -> mlx5_eswitch_disable_locked ->\nmlx5_eswitch_event_handler_unregister -> flush_workqueue deadlocks\nwhen esw_vfs_changed_event_handler executes.\n\nFix that by no longer flushing the work to avoid the deadlock, and using\na generation counter to keep track of work relevance. This avoids an old\nhandler manipulating an esw that has undergone one or more mode changes:\n- the counter is incremented in mlx5_eswitch_event_handler_unregister.\n- the counter is read and passed to the ephemeral mlx5_host_work struct.\n- the work handler takes the devlink lock and bails out if the current\n  generation is different than the one it was scheduled to operate on.\n- mlx5_eswitch_cleanup does the final draining before destroying the wq.\n\nNo longer flushing the workqueue has the side effect of maybe no longer\ncancelling pending vport_change_handler work items, but that's ok since\nthose are disabled elsewhere:\n- mlx5_eswitch_disable_locked disables the vport eq notifier.\n- mlx5_esw_vport_disable disarms the HW EQ notification and marks\n  vport->enabled under state_lock to false to prevent pending vport\n  handler from doing anything.\n- mlx5_eswitch_cleanup destroys the workqueue and makes sure all events\n  are disabled/finished.","Type":"Description","Title":"net/mlx5: Fix deadlock between devlink lock and esw->wq"}]}}}