CVE-2026-43295
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/05/2026
Last modified:
14/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net()<br />
<br />
When idtab allocation fails, net is not registered with rio_add_net() yet,<br />
so kfree(net) is sufficient to release the memory. Set mport->net to NULL<br />
to avoid dangling pointer.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.6 (including) | 5.10.252 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.202 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.165 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.128 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/34a4f233df5eef5f1f113b2196142c0568b387f8
- https://git.kernel.org/stable/c/649c2e853608cad0b0cba545555d168e67f094b3
- https://git.kernel.org/stable/c/666183dcdd9ad3b8156a1df7f204f728f720380f
- https://git.kernel.org/stable/c/78812c4fb7ed242d5961bf1337a49070d6487c94
- https://git.kernel.org/stable/c/83e579c2f7f6b1706323d744833b26470049dcc2
- https://git.kernel.org/stable/c/87272e3e70ec4b666885bd520ff77463c11444ef
- https://git.kernel.org/stable/c/e5a732bfe29451e16abf9c6f07ce5948b22f3d59
- https://git.kernel.org/stable/c/fecf292c6691970897396190855aa38826b7104e



