CVE-2026-43467
Kernel crash in switchdev mode for Mellanox mlx5 driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mlx5 | mlx5_core | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's mlx5 network driver when switching to switchdev mode on a device that does not support IPsec.
The issue arises because the driver attempts to clean up IPsec resources even if the device lacks IPsec support, which leads to a crash.
The fix involves adding a proper check for IPsec support before attempting to clean up those resources, preventing the crash.
How can this vulnerability impact me? :
If you use the affected Linux kernel with mlx5 devices and switch to switchdev mode on devices without IPsec support, this vulnerability can cause the kernel to crash.
Such crashes can lead to system instability, potential downtime, and disruption of network services relying on the mlx5 driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability causes a crash in the Linux kernel when moving to switchdev mode on devices that do not support IPsec. Detection can be done by monitoring kernel logs for crash messages related to mlx5 and switchdev mode transitions.
You can check the kernel logs for warning or error messages similar to the following pattern which indicates the crash:
- dmesg | grep -i 'mlx5e_ipsec_disable_events'
- dmesg | grep -i 'devlink'
- journalctl -k | grep -i 'mlx5_core'
Additionally, monitoring for kernel oops or panic messages related to mlx5 or switchdev mode changes can help detect this issue.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correctly checking for IPsec support before cleaning up IPsec resources when moving to switchdev mode. Immediate mitigation steps include:
- Update the Linux kernel to a version that includes the fix for this vulnerability.
- Avoid switching to switchdev mode on devices that do not support IPsec until the fix is applied.
- Monitor kernel logs for crash symptoms and avoid operations that trigger the crash.