Description
In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Add NULL checks when resetting request and reply queues

The driver encountered a crash during resource cleanup when the reply and
request queues were NULL due to freed memory. This issue occurred when the
creation of reply or request queues failed, and the driver freed the memory
first, but attempted to mem set the content of the freed memory, leading to
a system crash.

Add NULL pointer checks for reply and request queues before accessing the
reply/request memory during cleanup
Published: 2026-05-08
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The mpi3mr SCSI driver in the Linux kernel suffered from a use‑after‑free condition during resource cleanup. When a reply or request queue could not be created, the driver freed the memory and later attempted to clear it with a memory set operation, causing a system crash. This flaw allowed a local attacker to trigger a denial‑of‑service by forcing a queue allocation failure during SCSI device removal.

Affected Systems

All Linux kernel releases that compile the legacy mpi3mr driver and lack the added null‑check patch may be affected. No specific kernel version range was provided, so the issue could exist in any kernel revision prior to the upstream patch that introduced the guard.

Risk and Exploitability

Because the bug leads to an unhandled kernel crash, the primary impact is a denial‑of‑service. The flaw is local; it requires an attacker who can trigger a queue allocation failure, such as through a malicious SCSI device or local privilege. The CVSS score is 7.0, indicating a medium‑to‑high severity. EPSS data is not available and the vulnerability is not listed in CISA KEV, but the deterministic crash behavior and lack of safeguards make it a high‑risk issue.

Generated by OpenCVE AI on May 9, 2026 at 13:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains the mpi3mr null‑check patch
  • Rebuild and install the updated kernel image on all affected hosts
  • Restart the system to load the patched driver

Generated by OpenCVE AI on May 9, 2026 at 13:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-825
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Sat, 09 May 2026 06:30:00 +0000


Fri, 08 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks when resetting request and reply queues The driver encountered a crash during resource cleanup when the reply and request queues were NULL due to freed memory. This issue occurred when the creation of reply or request queues failed, and the driver freed the memory first, but attempted to mem set the content of the freed memory, leading to a system crash. Add NULL pointer checks for reply and request queues before accessing the reply/request memory during cleanup
Title scsi: mpi3mr: Add NULL checks when resetting request and reply queues
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:11:06.114Z

Reserved: 2026-05-01T14:12:56.011Z

Link: CVE-2026-43473

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:17:00.453

Modified: 2026-05-09T06:16:15.580

Link: CVE-2026-43473

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43473 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T13:45:34Z

Weaknesses