CVE-2026-43364
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/05/2026
Last modified:
15/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ublk: fix NULL pointer dereference in ublk_ctrl_set_size()<br />
<br />
ublk_ctrl_set_size() unconditionally dereferences ub->ub_disk via<br />
set_capacity_and_notify() without checking if it is NULL.<br />
<br />
ub->ub_disk is NULL before UBLK_CMD_START_DEV completes (it is only<br />
assigned in ublk_ctrl_start_dev()) and after UBLK_CMD_STOP_DEV runs<br />
(ublk_detach_disk() sets it to NULL). Since the UBLK_CMD_UPDATE_SIZE<br />
handler performs no state validation, a user can trigger a NULL pointer<br />
dereference by sending UPDATE_SIZE to a device that has been added but<br />
not yet started, or one that has been stopped.<br />
<br />
Fix this by checking ub->ub_disk under ub->mutex before dereferencing<br />
it, and returning -ENODEV if the disk is not available.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.18.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



