0.0
NA
CVE-2026-43221
ipmi: ipmb: initialise event handler read bytes
Description

In the Linux kernel, the following vulnerability has been resolved: ipmi: ipmb: initialise event handler read bytes IPMB doesn't use i2c reads, but the handler needs to set a value. Otherwise an i2c read will return an uninitialised value from the bus driver.

INFO

Published Date :

May 6, 2026, 12:16 p.m.

Last Modified :

May 6, 2026, 1:07 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2026-43221 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Update the Linux kernel to resolve uninitialized value issues in IPMB event handler.
  • Update the Linux kernel.
  • Apply the patch for ipmi: ipmb initialization.
  • Ensure event handler is initialized correctly.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-43221 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-43221 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-43221 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-43221 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 06, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: ipmi: ipmb: initialise event handler read bytes IPMB doesn't use i2c reads, but the handler needs to set a value. Otherwise an i2c read will return an uninitialised value from the bus driver.
    Added Reference https://git.kernel.org/stable/c/102712417bb6aa9a00d852bc59cb0a276db486c4
    Added Reference https://git.kernel.org/stable/c/2dfbc8c17dd161885336e77e71c336cd62cf6748
    Added Reference https://git.kernel.org/stable/c/56d5c0557e53c4d8d92a619fa83eaae178165e07
    Added Reference https://git.kernel.org/stable/c/905554ebd76aeee370bfd5136ea11e0b9d75c6f1
    Added Reference https://git.kernel.org/stable/c/9f235ccecd03c436cb1683eac16b12f119e54aa9
    Added Reference https://git.kernel.org/stable/c/f726b3a57e00bb6249c67714c11ae8b4b31719a1
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.