U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-43473 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks when resetting request and reply queues The driver encountered a crash during resource cleanup when the reply and request queues were NULL due to freed memory. This issue occurred when the creation of reply or request queues failed, and the driver freed the memory first, but attempted to mem set the content of the freed memory, leading to a system crash. Add NULL pointer checks for reply and request queues before accessing the reply/request memory during cleanup


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/220d7ca70611a73d50ef8e9edac630ed1ececb7c kernel.org
https://git.kernel.org/stable/c/78d3f201f8b609928eade53cf03a52df5415aaf7 kernel.org
https://git.kernel.org/stable/c/7da755e0d02e9ca035065127e108d1fed8950dc8 kernel.org
https://git.kernel.org/stable/c/7df0296ad4e9253d12c6dbe7f120044dddc95600 kernel.org
https://git.kernel.org/stable/c/e978a36f332ede78eb4de037b517db16265d420d kernel.org
https://git.kernel.org/stable/c/fa96392ebebc8fade2b878acb14cce0f71016503 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-43473
NVD Published Date:
05/08/2026
NVD Last Modified:
05/09/2026
Source:
kernel.org