{"api_version":"1","generated_at":"2026-05-12T18:11:30+00:00","cve":"CVE-2026-43471","urls":{"html":"https://cve.report/CVE-2026-43471","api":"https://cve.report/api/cve/CVE-2026-43471.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43471","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43471"},"summary":{"title":"scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()\n\nThe kernel log indicates a crash in ufshcd_add_command_trace, due to a NULL\npointer dereference when accessing hwq->id.  This can happen if\nufshcd_mcq_req_to_hwq() returns NULL.\n\nThis patch adds a NULL check for hwq before accessing its id field to\nprevent a kernel crash.\n\nKernel log excerpt:\n[<ffffffd5d192dc4c>] notify_die+0x4c/0x8c\n[<ffffffd5d1814e58>] __die+0x60/0xb0\n[<ffffffd5d1814d64>] die+0x4c/0xe0\n[<ffffffd5d181575c>] die_kernel_fault+0x74/0x88\n[<ffffffd5d1864db4>] __do_kernel_fault+0x314/0x318\n[<ffffffd5d2a3cdf8>] do_page_fault+0xa4/0x5f8\n[<ffffffd5d2a3cd34>] do_translation_fault+0x34/0x54\n[<ffffffd5d1864524>] do_mem_abort+0x50/0xa8\n[<ffffffd5d2a297dc>] el1_abort+0x3c/0x64\n[<ffffffd5d2a29718>] el1h_64_sync_handler+0x44/0xcc\n[<ffffffd5d181133c>] el1h_64_sync+0x80/0x88\n[<ffffffd5d255c1dc>] ufshcd_add_command_trace+0x23c/0x320\n[<ffffffd5d255bad8>] ufshcd_compl_one_cqe+0xa4/0x404\n[<ffffffd5d2572968>] ufshcd_mcq_poll_cqe_lock+0xac/0x104\n[<ffffffd5d11c7460>] ufs_mtk_mcq_intr+0x54/0x74 [ufs_mediatek_mod]\n[<ffffffd5d19ab92c>] __handle_irq_event_percpu+0xc8/0x348\n[<ffffffd5d19abca8>] handle_irq_event+0x3c/0xa8\n[<ffffffd5d19b1f0c>] handle_fasteoi_irq+0xf8/0x294\n[<ffffffd5d19aa778>] generic_handle_domain_irq+0x54/0x80\n[<ffffffd5d18102bc>] gic_handle_irq+0x1d4/0x330\n[<ffffffd5d1838210>] call_on_irq_stack+0x44/0x68\n[<ffffffd5d183af30>] do_interrupt_handler+0x78/0xd8\n[<ffffffd5d2a29c00>] el1_interrupt+0x48/0xa8\n[<ffffffd5d2a29ba8>] el1h_64_irq_handler+0x14/0x24\n[<ffffffd5d18113c4>] el1h_64_irq+0x80/0x88\n[<ffffffd5d2527fb4>] arch_local_irq_enable+0x4/0x1c\n[<ffffffd5d25282e4>] cpuidle_enter+0x34/0x54\n[<ffffffd5d195a678>] do_idle+0x1dc/0x2f8\n[<ffffffd5d195a7c4>] cpu_startup_entry+0x30/0x3c\n[<ffffffd5d18155c4>] secondary_start_kernel+0x134/0x1ac\n[<ffffffd5d18640bc>] __secondary_switched+0xc4/0xcc","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 15:17:00","updated_at":"2026-05-12 14:10:27"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/30df81f2228d65bddf492db3929d9fcaffd38fc5","name":"https://git.kernel.org/stable/c/30df81f2228d65bddf492db3929d9fcaffd38fc5","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/0614f5618c24fbc3d555efade22887b102ad7ad6","name":"https://git.kernel.org/stable/c/0614f5618c24fbc3d555efade22887b102ad7ad6","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/f4f590c6c9df7453bbda2ef9170b1b09e42a124c","name":"https://git.kernel.org/stable/c/f4f590c6c9df7453bbda2ef9170b1b09e42a124c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/93b9e7ee9e93629db80bbc9dab8a874215b89ccf","name":"https://git.kernel.org/stable/c/93b9e7ee9e93629db80bbc9dab8a874215b89ccf","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/be730f9ee92ae08f2bc4b336967bcfd8183c06fe","name":"https://git.kernel.org/stable/c/be730f9ee92ae08f2bc4b336967bcfd8183c06fe","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43471","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43471","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected bed0896008334eeee4b4bfd7150491ca098cbf72 0614f5618c24fbc3d555efade22887b102ad7ad6 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 9307a998cb9846a2557fdca286997430bee36a2a be730f9ee92ae08f2bc4b336967bcfd8183c06fe git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 9307a998cb9846a2557fdca286997430bee36a2a f4f590c6c9df7453bbda2ef9170b1b09e42a124c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 9307a998cb9846a2557fdca286997430bee36a2a 93b9e7ee9e93629db80bbc9dab8a874215b89ccf git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 9307a998cb9846a2557fdca286997430bee36a2a 30df81f2228d65bddf492db3929d9fcaffd38fc5 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 11d81233f4ebe6907b12c79ad7d8787aa4db0633 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.10","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.10 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.130 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.78 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.19 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.9 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43471","cve":"CVE-2026-43471","epss":"0.000180000","percentile":"0.049210000","score_date":"2026-05-11","updated_at":"2026-05-12 00:01:17"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/ufs/core/ufshcd.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"0614f5618c24fbc3d555efade22887b102ad7ad6","status":"affected","version":"bed0896008334eeee4b4bfd7150491ca098cbf72","versionType":"git"},{"lessThan":"be730f9ee92ae08f2bc4b336967bcfd8183c06fe","status":"affected","version":"9307a998cb9846a2557fdca286997430bee36a2a","versionType":"git"},{"lessThan":"f4f590c6c9df7453bbda2ef9170b1b09e42a124c","status":"affected","version":"9307a998cb9846a2557fdca286997430bee36a2a","versionType":"git"},{"lessThan":"93b9e7ee9e93629db80bbc9dab8a874215b89ccf","status":"affected","version":"9307a998cb9846a2557fdca286997430bee36a2a","versionType":"git"},{"lessThan":"30df81f2228d65bddf492db3929d9fcaffd38fc5","status":"affected","version":"9307a998cb9846a2557fdca286997430bee36a2a","versionType":"git"},{"status":"affected","version":"11d81233f4ebe6907b12c79ad7d8787aa4db0633","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/ufs/core/ufshcd.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.10"},{"lessThan":"6.10","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.130","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.78","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.19","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.9","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.130","versionStartIncluding":"6.6.41","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.78","versionStartIncluding":"6.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.19","versionStartIncluding":"6.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.9","versionStartIncluding":"6.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9.10","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()\n\nThe kernel log indicates a crash in ufshcd_add_command_trace, due to a NULL\npointer dereference when accessing hwq->id.  This can happen if\nufshcd_mcq_req_to_hwq() returns NULL.\n\nThis patch adds a NULL check for hwq before accessing its id field to\nprevent a kernel crash.\n\nKernel log excerpt:\n[<ffffffd5d192dc4c>] notify_die+0x4c/0x8c\n[<ffffffd5d1814e58>] __die+0x60/0xb0\n[<ffffffd5d1814d64>] die+0x4c/0xe0\n[<ffffffd5d181575c>] die_kernel_fault+0x74/0x88\n[<ffffffd5d1864db4>] __do_kernel_fault+0x314/0x318\n[<ffffffd5d2a3cdf8>] do_page_fault+0xa4/0x5f8\n[<ffffffd5d2a3cd34>] do_translation_fault+0x34/0x54\n[<ffffffd5d1864524>] do_mem_abort+0x50/0xa8\n[<ffffffd5d2a297dc>] el1_abort+0x3c/0x64\n[<ffffffd5d2a29718>] el1h_64_sync_handler+0x44/0xcc\n[<ffffffd5d181133c>] el1h_64_sync+0x80/0x88\n[<ffffffd5d255c1dc>] ufshcd_add_command_trace+0x23c/0x320\n[<ffffffd5d255bad8>] ufshcd_compl_one_cqe+0xa4/0x404\n[<ffffffd5d2572968>] ufshcd_mcq_poll_cqe_lock+0xac/0x104\n[<ffffffd5d11c7460>] ufs_mtk_mcq_intr+0x54/0x74 [ufs_mediatek_mod]\n[<ffffffd5d19ab92c>] __handle_irq_event_percpu+0xc8/0x348\n[<ffffffd5d19abca8>] handle_irq_event+0x3c/0xa8\n[<ffffffd5d19b1f0c>] handle_fasteoi_irq+0xf8/0x294\n[<ffffffd5d19aa778>] generic_handle_domain_irq+0x54/0x80\n[<ffffffd5d18102bc>] gic_handle_irq+0x1d4/0x330\n[<ffffffd5d1838210>] call_on_irq_stack+0x44/0x68\n[<ffffffd5d183af30>] do_interrupt_handler+0x78/0xd8\n[<ffffffd5d2a29c00>] el1_interrupt+0x48/0xa8\n[<ffffffd5d2a29ba8>] el1h_64_irq_handler+0x14/0x24\n[<ffffffd5d18113c4>] el1h_64_irq+0x80/0x88\n[<ffffffd5d2527fb4>] arch_local_irq_enable+0x4/0x1c\n[<ffffffd5d25282e4>] cpuidle_enter+0x34/0x54\n[<ffffffd5d195a678>] do_idle+0x1dc/0x2f8\n[<ffffffd5d195a7c4>] cpu_startup_entry+0x30/0x3c\n[<ffffffd5d18155c4>] secondary_start_kernel+0x134/0x1ac\n[<ffffffd5d18640bc>] __secondary_switched+0xc4/0xcc"}],"providerMetadata":{"dateUpdated":"2026-05-11T22:25:15.121Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/0614f5618c24fbc3d555efade22887b102ad7ad6"},{"url":"https://git.kernel.org/stable/c/be730f9ee92ae08f2bc4b336967bcfd8183c06fe"},{"url":"https://git.kernel.org/stable/c/f4f590c6c9df7453bbda2ef9170b1b09e42a124c"},{"url":"https://git.kernel.org/stable/c/93b9e7ee9e93629db80bbc9dab8a874215b89ccf"},{"url":"https://git.kernel.org/stable/c/30df81f2228d65bddf492db3929d9fcaffd38fc5"}],"title":"scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43471","datePublished":"2026-05-08T14:22:30.909Z","dateReserved":"2026-05-01T14:12:56.011Z","dateUpdated":"2026-05-11T22:25:15.121Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 15:17:00","lastModifiedDate":"2026-05-12 14:10:27","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43471","Ordinal":"1","Title":"scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd","CVE":"CVE-2026-43471","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43471","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()\n\nThe kernel log indicates a crash in ufshcd_add_command_trace, due to a NULL\npointer dereference when accessing hwq->id.  This can happen if\nufshcd_mcq_req_to_hwq() returns NULL.\n\nThis patch adds a NULL check for hwq before accessing its id field to\nprevent a kernel crash.\n\nKernel log excerpt:\n[<ffffffd5d192dc4c>] notify_die+0x4c/0x8c\n[<ffffffd5d1814e58>] __die+0x60/0xb0\n[<ffffffd5d1814d64>] die+0x4c/0xe0\n[<ffffffd5d181575c>] die_kernel_fault+0x74/0x88\n[<ffffffd5d1864db4>] __do_kernel_fault+0x314/0x318\n[<ffffffd5d2a3cdf8>] do_page_fault+0xa4/0x5f8\n[<ffffffd5d2a3cd34>] do_translation_fault+0x34/0x54\n[<ffffffd5d1864524>] do_mem_abort+0x50/0xa8\n[<ffffffd5d2a297dc>] el1_abort+0x3c/0x64\n[<ffffffd5d2a29718>] el1h_64_sync_handler+0x44/0xcc\n[<ffffffd5d181133c>] el1h_64_sync+0x80/0x88\n[<ffffffd5d255c1dc>] ufshcd_add_command_trace+0x23c/0x320\n[<ffffffd5d255bad8>] ufshcd_compl_one_cqe+0xa4/0x404\n[<ffffffd5d2572968>] ufshcd_mcq_poll_cqe_lock+0xac/0x104\n[<ffffffd5d11c7460>] ufs_mtk_mcq_intr+0x54/0x74 [ufs_mediatek_mod]\n[<ffffffd5d19ab92c>] __handle_irq_event_percpu+0xc8/0x348\n[<ffffffd5d19abca8>] handle_irq_event+0x3c/0xa8\n[<ffffffd5d19b1f0c>] handle_fasteoi_irq+0xf8/0x294\n[<ffffffd5d19aa778>] generic_handle_domain_irq+0x54/0x80\n[<ffffffd5d18102bc>] gic_handle_irq+0x1d4/0x330\n[<ffffffd5d1838210>] call_on_irq_stack+0x44/0x68\n[<ffffffd5d183af30>] do_interrupt_handler+0x78/0xd8\n[<ffffffd5d2a29c00>] el1_interrupt+0x48/0xa8\n[<ffffffd5d2a29ba8>] el1h_64_irq_handler+0x14/0x24\n[<ffffffd5d18113c4>] el1h_64_irq+0x80/0x88\n[<ffffffd5d2527fb4>] arch_local_irq_enable+0x4/0x1c\n[<ffffffd5d25282e4>] cpuidle_enter+0x34/0x54\n[<ffffffd5d195a678>] do_idle+0x1dc/0x2f8\n[<ffffffd5d195a7c4>] cpu_startup_entry+0x30/0x3c\n[<ffffffd5d18155c4>] secondary_start_kernel+0x134/0x1ac\n[<ffffffd5d18640bc>] __secondary_switched+0xc4/0xcc","Type":"Description","Title":"scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd"}]}}}