CVE-2026-43468

MEDIUMNVD 5.5
5.5

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix deadlock between devlink lock and esw->wq

esw->work_queue executes esw_functions_changed_event_handler -> esw_vfs_changed_event_handler and acquires the devlink lock.

.eswitch_mode_set (acquires devlink lock in devlink_nl_pre_doit) -> mlx5_devlink_eswitch_mode_set -> mlx5_eswitch_disable_locked -> mlx5_eswitch_event_handler_unregister -> flush_workqueue deadlocks when esw_vfs_changed_event_handler executes.

Fix that by no longer flushing the work to avoid the deadlock, and using a generation counter to keep track of work relevance. This avoids an old handler manipulating an esw that has undergone one or more mode changes:

  • the counter is incremented in mlx5_eswitch_event_handler_unregister.
  • the counter is read and passed to the ephemeral mlx5_host_work struct.
  • the work handler takes the devlink lock and bails out if the current
generation is different than the one it was scheduled to operate on.
  • mlx5_eswitch_cleanup does the final draining before destroying the wq.

No longer flushing the workqueue has the side effect of maybe no longer cancelling pending vport_change_handler work items, but that's ok since those are disabled elsewhere:

  • mlx5_eswitch_disable_locked disables the vport eq notifier.
  • mlx5_esw_vport_disable disarms the HW EQ notification and marks
vport->enabled under state_lock to false to prevent pending vport handler from doing anything.
  • mlx5_eswitch_cleanup destroys the workqueue and makes sure all events
are disabled/finished.

CVSS v3
5.5
EG Score
0.0(none)
EPSS
1.8%
KEV
Not listed

Published

May 8, 2026

Last Modified

May 21, 2026

Frequently asked(5)

What is CVE-2026-43468?
CVE-2026-43468 is a medium vulnerability published on May 8, 2026. In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix deadlock between devlink lock and esw->wq esw->workqueue executes eswfunctionschangedevent_handler -> eswvfschangedeventhandler and acquires the devlink lock. .eswitchmodeset (acquires devlink lock in…
When was CVE-2026-43468 disclosed?
CVE-2026-43468 was first published in the National Vulnerability Database on May 8, 2026, with the most recent update on May 21, 2026. EchelonGraph re-ingests CVE updates from NVD on a 2-hour cycle, so this page reflects the latest published state.
Is CVE-2026-43468 actively exploited?
CVE-2026-43468 is not currently on CISA's Known Exploited Vulnerabilities catalog. FIRST EPSS estimates a 1.8% percentile likelihood of exploitation in the next 30 days — higher percentiles indicate greater predicted risk.
What is the CVSS score of CVE-2026-43468?
CVE-2026-43468 has a CVSS v3 base score of 5.5 (NVD). EchelonGraph synthesises NVD + CISA KEV + FIRST EPSS + GHSA into a combined EG score of 0.0.
How do I remediate CVE-2026-43468?
Patch to the fixed version published by the affected vendor. Where vendor advisories exist for CVE-2026-43468, EchelonGraph cross-links them in the Vendor Advisories panel below — those typically contain the canonical remediation steps, fixed version numbers, and any vendor-specific mitigations.

Dependency Blast Radius

See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-43468

Explore →

Is Your Infrastructure Affected by CVE-2026-43468?

EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.