CVE-2026-43473
Published: Fri, 08 May 2026 15:17
Summary
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks when resetting request and reply queues The driver encountered a crash during resource cleanup when
Details
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks when resetting request and reply queues The driver encountered a crash during resource cleanup when the reply and request queues were NULL due to freed memory. This issue occurred when the creation of reply or request queues failed, and the driver freed the memory first, but attempted to mem set the content of the freed memory, leading to a system crash. Add NULL pointer checks for reply and request queues before accessing the reply/request memory during cleanup
Are YOU affected by CVE-2026-43473?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-43473 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/220d7ca70611a73d50ef8e9edac630ed1ececb7c
- https://git.kernel.org/stable/c/78d3f201f8b609928eade53cf03a52df5415aaf7
- https://git.kernel.org/stable/c/7da755e0d02e9ca035065127e108d1fed8950dc8
- https://git.kernel.org/stable/c/7df0296ad4e9253d12c6dbe7f120044dddc95600
- https://git.kernel.org/stable/c/e978a36f332ede78eb4de037b517db16265d420d
- https://git.kernel.org/stable/c/fa96392ebebc8fade2b878acb14cce0f71016503
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.