CVE-2026-43219
Kernel Netdev Unregister Flaw in Linux CPSW Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux | kernel | * |
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's network driver code related to the cpsw (Ethernet switch) component. Specifically, if an error occurs during the registration of the first MAC device in cpsw_register_ports(), the code does not properly clear the state of the second MAC device. As a result, when cpsw_unregister_ports() is later called, it may attempt to unregister the second MAC device even though it was never properly registered. This can lead to incorrect behavior or potential errors during device unregistration.
The fix involves adding a check for the registration state (reg_state) of the network device before attempting to unregister it, preventing the unregistration of devices that were never registered.
How can this vulnerability impact me? :
This vulnerability could cause the Linux kernel to attempt to unregister network devices that were never properly registered, potentially leading to system instability or unexpected errors in network device management. While the description does not specify direct security impacts such as privilege escalation or data leakage, improper handling of network device states could affect network functionality or reliability.