Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet IDs before indexing tx_frames wl1251_tx_packet_cb() uses the firmware completion ID directly to index the fixed 16-entry wl->tx_frames[] array. The ID is a raw u8 from the completion block, and the callback does not currently verify that it fits the array before dereferencing it. Reject completion IDs that fall outside wl->tx_frames[] and keep the existing NULL check in the same guard. This keeps the fix local to the trust boundary and avoids touching the rest of the completion flow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.31, < 6.6.136 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0fd56fad9c56356e7fa7a7c52e7ecbf807a44eb0Patch
- https://git.kernel.org/stable/c/26ee518695c484f75e3606d631278e84bd24ae02Patch
- https://git.kernel.org/stable/c/8d7465be5163a923ee5d7459719ef5a021c1584aPatch
- https://git.kernel.org/stable/c/b6ba1eacf276063ebeefbbae8056043c24f2efafPatch
- https://git.kernel.org/stable/c/df15adc692a802636dd3f258fc7cca8bf7a0ed9aPatch
FAQ
What is CVE-2026-43113?
CVE-2026-43113 is a vulnerability with a CVSS score of 8.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet IDs before indexing tx_frames wl1251_tx_packet_cb() uses the firmware completion ID directly to inde...
How severe is CVE-2026-43113?
CVE-2026-43113 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43113?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.