// For flags

CVE-2026-43296

octeontx2-af: Workaround SQM/PSE stalls by disabling sticky

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Workaround SQM/PSE stalls by disabling sticky NIX SQ manager sticky mode is known to cause stalls when multiple SQs
share an SMQ and transmit concurrently. Additionally, PSE may deadlock
on transitions between sticky and non-sticky transmissions. There is
also a credit drop issue observed when certain condition clocks are
gated. work around these hardware errata by:
- Disabling SQM sticky operation: - Clear TM6 (bit 15) - Clear TM11 (bit 14)
- Disabling sticky → non-sticky transition path that can deadlock PSE: - Clear TM5 (bit 23)
- Preventing credit drops by keeping the control-flow clock enabled: - Set TM9 (bit 21) These changes are applied via NIX_AF_SQM_DBG_CTL_STATUS. With this
configuration the SQM/PSE maintain forward progress under load without
credit loss, at the cost of disabling sticky optimizations.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2026-05-01 CVE Reserved
  • 2026-05-08 CVE Published
  • 2026-05-14 EPSS Updated
  • 2026-05-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-667: Improper Locking
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 5.10.252
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 5.10.252"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 5.15.202
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 5.15.202"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 6.1.165
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 6.1.165"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 6.6.128
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 6.6.128"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 6.12.75
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 6.12.75"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 6.18.16
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 6.18.16"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 6.19.6
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 6.19.6"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 7.0
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 7.0"
en
Affected