{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43471","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:56.011Z","datePublished":"2026-05-08T14:22:30.909Z","dateUpdated":"2026-05-11T22:25:15.121Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:25:15.121Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()\n\nThe kernel log indicates a crash in ufshcd_add_command_trace, due to a NULL\npointer dereference when accessing hwq->id.  This can happen if\nufshcd_mcq_req_to_hwq() returns NULL.\n\nThis patch adds a NULL check for hwq before accessing its id field to\nprevent a kernel crash.\n\nKernel log excerpt:\n[<ffffffd5d192dc4c>] notify_die+0x4c/0x8c\n[<ffffffd5d1814e58>] __die+0x60/0xb0\n[<ffffffd5d1814d64>] die+0x4c/0xe0\n[<ffffffd5d181575c>] die_kernel_fault+0x74/0x88\n[<ffffffd5d1864db4>] __do_kernel_fault+0x314/0x318\n[<ffffffd5d2a3cdf8>] do_page_fault+0xa4/0x5f8\n[<ffffffd5d2a3cd34>] do_translation_fault+0x34/0x54\n[<ffffffd5d1864524>] do_mem_abort+0x50/0xa8\n[<ffffffd5d2a297dc>] el1_abort+0x3c/0x64\n[<ffffffd5d2a29718>] el1h_64_sync_handler+0x44/0xcc\n[<ffffffd5d181133c>] el1h_64_sync+0x80/0x88\n[<ffffffd5d255c1dc>] ufshcd_add_command_trace+0x23c/0x320\n[<ffffffd5d255bad8>] ufshcd_compl_one_cqe+0xa4/0x404\n[<ffffffd5d2572968>] ufshcd_mcq_poll_cqe_lock+0xac/0x104\n[<ffffffd5d11c7460>] ufs_mtk_mcq_intr+0x54/0x74 [ufs_mediatek_mod]\n[<ffffffd5d19ab92c>] __handle_irq_event_percpu+0xc8/0x348\n[<ffffffd5d19abca8>] handle_irq_event+0x3c/0xa8\n[<ffffffd5d19b1f0c>] handle_fasteoi_irq+0xf8/0x294\n[<ffffffd5d19aa778>] generic_handle_domain_irq+0x54/0x80\n[<ffffffd5d18102bc>] gic_handle_irq+0x1d4/0x330\n[<ffffffd5d1838210>] call_on_irq_stack+0x44/0x68\n[<ffffffd5d183af30>] do_interrupt_handler+0x78/0xd8\n[<ffffffd5d2a29c00>] el1_interrupt+0x48/0xa8\n[<ffffffd5d2a29ba8>] el1h_64_irq_handler+0x14/0x24\n[<ffffffd5d18113c4>] el1h_64_irq+0x80/0x88\n[<ffffffd5d2527fb4>] arch_local_irq_enable+0x4/0x1c\n[<ffffffd5d25282e4>] cpuidle_enter+0x34/0x54\n[<ffffffd5d195a678>] do_idle+0x1dc/0x2f8\n[<ffffffd5d195a7c4>] cpu_startup_entry+0x30/0x3c\n[<ffffffd5d18155c4>] secondary_start_kernel+0x134/0x1ac\n[<ffffffd5d18640bc>] __secondary_switched+0xc4/0xcc"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ufs/core/ufshcd.c"],"versions":[{"version":"bed0896008334eeee4b4bfd7150491ca098cbf72","lessThan":"0614f5618c24fbc3d555efade22887b102ad7ad6","status":"affected","versionType":"git"},{"version":"9307a998cb9846a2557fdca286997430bee36a2a","lessThan":"be730f9ee92ae08f2bc4b336967bcfd8183c06fe","status":"affected","versionType":"git"},{"version":"9307a998cb9846a2557fdca286997430bee36a2a","lessThan":"f4f590c6c9df7453bbda2ef9170b1b09e42a124c","status":"affected","versionType":"git"},{"version":"9307a998cb9846a2557fdca286997430bee36a2a","lessThan":"93b9e7ee9e93629db80bbc9dab8a874215b89ccf","status":"affected","versionType":"git"},{"version":"9307a998cb9846a2557fdca286997430bee36a2a","lessThan":"30df81f2228d65bddf492db3929d9fcaffd38fc5","status":"affected","versionType":"git"},{"version":"11d81233f4ebe6907b12c79ad7d8787aa4db0633","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/ufs/core/ufshcd.c"],"versions":[{"version":"6.10","status":"affected"},{"version":"0","lessThan":"6.10","status":"unaffected","versionType":"semver"},{"version":"6.6.130","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.78","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.19","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.9","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.41","versionEndExcluding":"6.6.130"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.12.78"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.18.19"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.19.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"7.0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/0614f5618c24fbc3d555efade22887b102ad7ad6"},{"url":"https://git.kernel.org/stable/c/be730f9ee92ae08f2bc4b336967bcfd8183c06fe"},{"url":"https://git.kernel.org/stable/c/f4f590c6c9df7453bbda2ef9170b1b09e42a124c"},{"url":"https://git.kernel.org/stable/c/93b9e7ee9e93629db80bbc9dab8a874215b89ccf"},{"url":"https://git.kernel.org/stable/c/30df81f2228d65bddf492db3929d9fcaffd38fc5"}],"title":"scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()","x_generator":{"engine":"bippy-1.2.0"}}}}