CVE-2026-43113
wifi: wl1251: validate packet IDs before indexing tx_frames
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet IDs before indexing tx_frames wl1251_tx_packet_cb() uses the firmware completion ID directly to index the fixed 16-entry wl->tx_frames[] array. The ID is a raw u8 from the completion block, and the callback does not currently verify that it fits the array before dereferencing it. Reject completion IDs that fall outside wl->tx_frames[] and keep the existing NULL check in the same guard. This keeps the fix local to the trust boundary and avoids touching the rest of the completion flow.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b6ba1eacf276063ebeefbbae8056043c24f2efaf 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < df15adc692a802636dd3f258fc7cca8bf7a0ed9a 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8d7465be5163a923ee5d7459719ef5a021c1584a 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 26ee518695c484f75e3606d631278e84bd24ae02 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 0fd56fad9c56356e7fa7a7c52e7ecbf807a44eb0
Linux / Linux
All versions affected References
git.kernel.org: https://git.kernel.org/stable/c/b6ba1eacf276063ebeefbbae8056043c24f2efaf git.kernel.org: https://git.kernel.org/stable/c/df15adc692a802636dd3f258fc7cca8bf7a0ed9a git.kernel.org: https://git.kernel.org/stable/c/8d7465be5163a923ee5d7459719ef5a021c1584a git.kernel.org: https://git.kernel.org/stable/c/26ee518695c484f75e3606d631278e84bd24ae02 git.kernel.org: https://git.kernel.org/stable/c/0fd56fad9c56356e7fa7a7c52e7ecbf807a44eb0