CVE-2026-43147
Deadlock in Linux Kernel PCI/IOV Subsystem
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's handling of PCI SR-IOV (Single Root I/O Virtualization). A previous commit added locking to prevent issues when enabling or disabling SR-IOV, but this commit caused a deadlock. The deadlock happens because the system tries to acquire a lock it already holds recursively during certain operations, such as removing virtual functions (VFs) or stopping and removing PCI devices. This deadlock can freeze the system or the affected process.
The vulnerability was addressed by reverting the problematic commit, which removes the deadlock but also restores the original issue the commit tried to fix. A new fix is planned to properly resolve the problem.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel when managing PCI devices with SR-IOV enabled. A deadlock means that certain system operations involving PCI device removal or virtual function management can hang indefinitely, potentially causing system instability or unresponsiveness.
If your system uses SR-IOV capable devices and performs operations like enabling/disabling virtual functions or removing PCI devices, this deadlock could disrupt normal operation, leading to service interruptions or requiring a system reboot.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing a deadlock occurring when enabling or disabling SR-IOV on PCI devices. Specifically, a deadlock happens due to recursive locking of pci_rescan_remove_lock during the call to sriov_del_vfs() as part of pci_stop_and_remove_bus_device().
A typical sequence that may trigger the deadlock is:
- $ echo <NUM> > /sys/bus/pci/devices/<pf>/sriov_numvfs
- $ echo 1 > /sys/bus/pci/devices/<pf>/remove
Monitoring kernel logs for deadlock traces involving pci_rescan_remove_lock and sriov_disable functions can also help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to avoid performing operations that enable or disable SR-IOV on PCI devices, such as writing to sriov_numvfs or removing PCI devices, until a proper fix is released.
Since the revert of the problematic commit restores the deadlock issue, waiting for the forthcoming fix and applying kernel updates as soon as they become available is recommended.