CVE-2026-43012
Kernel Bug in Linux Kernel Due to Switchdev Mode Rollback
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mlx | mlx5_core | * |
| mlx | mlx5 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's mlx5_core driver related to the switchdev mode rollback process. When switchdev mode fails internally, the system attempts to rollback to legacy mode. Before the patch, this rollback process would unregister the uplink network device (netdev) and leave it unregistered, which causes a kernel bug leading to a kernel crash (BUG at net/core/dev.c:12070). The fix involves avoiding the netdev unregister by setting a proper rollback flag (MLX5_PRIV_FLAGS_SWITCH_LEGACY) to indicate legacy mode, preventing the kernel bug.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a kernel bug triggered during the rollback from switchdev mode to legacy mode. Such a crash can lead to system instability, downtime, and potential loss of network connectivity on affected systems using the mlx5_core driver. This can disrupt services and operations relying on the affected network device.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel bug triggered when the switchdev mode rollback fails, causing the uplink netdev to unregister improperly. Detection can be done by monitoring kernel logs for specific error messages and kernel BUG traces related to mlx5_core and netdev unregister failures.
- Check kernel logs (e.g., using dmesg or journalctl) for messages containing 'mlx5_core', 'unregister_netdevice_many_notify', or 'kernel BUG at net/core/dev.c:12070'.
- Use the command: dmesg | grep mlx5_core
- Use the command: journalctl -k | grep -i 'unregister_netdevice'
- Look for Oops or BUG messages in kernel logs indicating invalid opcode or netdev unregister errors.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the switchdev mode rollback issue. The patch ensures that the rollback to legacy mode sets the proper flag to avoid unregistering the uplink netdev, preventing the kernel bug.
Until the patch is applied, avoid triggering switchdev mode rollback failures by carefully managing mlx5_core device configurations and monitoring for errors.
Regularly monitor kernel logs for early signs of the issue to take proactive action.