CVE-2026-43471
NULL Pointer Dereference in Linux Kernel UFS Core
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's SCSI UFS core component. It involves a possible NULL pointer dereference in the function ufshcd_add_command_trace(). Specifically, the kernel may crash when the code tries to access the id field of a hardware queue (hwq) pointer that can be NULL if the function ufshcd_mcq_req_to_hwq() returns NULL.
The issue is fixed by adding a NULL check before accessing the hwq id field, preventing the kernel from crashing due to this NULL pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash unexpectedly due to a NULL pointer dereference. Such crashes can lead to system instability, potential data loss, or denial of service as the kernel becomes unresponsive or restarts.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel crash due to a NULL pointer dereference in the ufshcd_add_command_trace() function. Detection involves monitoring the kernel logs for crash messages related to ufshcd_add_command_trace or NULL pointer dereferences involving hwq->id.
You can check your system logs for relevant kernel crash messages using commands such as:
- dmesg | grep ufshcd_add_command_trace
- journalctl -k | grep ufshcd_add_command_trace
- grep -i 'NULL pointer dereference' /var/log/kern.log
These commands help identify if the kernel has logged crashes or faults related to this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by adding a NULL check in the kernel code to prevent the NULL pointer dereference. Immediate mitigation involves updating your Linux kernel to a version that includes this fix.
If updating the kernel is not immediately possible, monitoring for kernel crashes related to ufshcd_add_command_trace and avoiding workloads that trigger this code path may reduce the risk of system crashes.
Ultimately, applying the patch or upgrading to a patched kernel version is the recommended step to fully mitigate this issue.