Description
In the Linux kernel, the following vulnerability has been resolved:

batman-adv: Avoid double-rtnl_lock ELP metric worker

batadv_v_elp_get_throughput() might be called when the RTNL lock is already
held. This could be problematic when the work queue item is cancelled via
cancel_delayed_work_sync() in batadv_v_elp_iface_disable(). In this case,
an rtnl_lock() would cause a deadlock.

To avoid this, rtnl_trylock() was used in this function to skip the
retrieval of the ethtool information in case the RTNL lock was already
held.

But for cfg80211 interfaces, batadv_get_real_netdev() was called - which
also uses rtnl_lock(). The approach for __ethtool_get_link_ksettings() must
also be used instead and the lockless version __batadv_get_real_netdev()
has to be called.
Published: 2026-05-08
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The batman-adv driver contains a synchronization flaw where batadv_v_elp_get_throughput() can be invoked while the RTNL lock is already held. When the associated work queue item is cancelled via cancel_delayed_work_sync() in batadv_v_elp_iface_disable(), the attempt to acquire the RTNL lock again can block, resulting in a deadlock. This lock contention can stall critical kernel networking paths and cause the network stack to become unresponsive, effectively denying network services. The weakness is a classic instance of improper locking leading to a deadlock (CWE‑367).

Affected Systems

All Linux kernel releases that ship the batman-adv driver before the patch, regardless of distribution vendor, are affected. The vendor is Linux, product is the Linux kernel, and no specific version range is supplied, so any active batman‑adv implementation that predates the fix is vulnerable.

Risk and Exploitability

Explicit exploitation metrics are not available: the EPSS score is not published and the cylinder is not listed in the CISA KEV catalog. The vulnerability is a local kernel race that can cause a deadlock; therefore the most likely attack vector requires local code execution or the presence of a malicious module that can trigger the problematic path. Because the impact is a denial of service and the severity rating is undefined, the risk can be considered moderate to high in environments where batman-adv is critical for network connectivity.

Generated by OpenCVE AI on May 8, 2026 at 16:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that includes the batman‑adv concurrency fix (commit 192f40ad8a7dac58dae9199a065dbf7e6e67b75b or later).
  • Reboot the system or restart the networking stack to ensure the updated driver takes effect.
  • If upgrading the kernel immediately is not possible, monitor for signs of lock contention and consider temporarily disabling the batman‑adv interface during maintenance windows to avoid a deadlock.

Generated by OpenCVE AI on May 8, 2026 at 16:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-367

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid double-rtnl_lock ELP metric worker batadv_v_elp_get_throughput() might be called when the RTNL lock is already held. This could be problematic when the work queue item is cancelled via cancel_delayed_work_sync() in batadv_v_elp_iface_disable(). In this case, an rtnl_lock() would cause a deadlock. To avoid this, rtnl_trylock() was used in this function to skip the retrieval of the ethtool information in case the RTNL lock was already held. But for cfg80211 interfaces, batadv_get_real_netdev() was called - which also uses rtnl_lock(). The approach for __ethtool_get_link_ksettings() must also be used instead and the lockless version __batadv_get_real_netdev() has to be called.
Title batman-adv: Avoid double-rtnl_lock ELP metric worker
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:30.062Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43382

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:49.463

Modified: 2026-05-08T15:16:49.463

Link: CVE-2026-43382

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T16:00:13Z

Weaknesses