CVE-2026-43113
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: wl1251: validate packet IDs before indexing tx_frames<br />
<br />
wl1251_tx_packet_cb() uses the firmware completion ID directly to index<br />
the fixed 16-entry wl->tx_frames[] array. The ID is a raw u8 from the<br />
completion block, and the callback does not currently verify that it<br />
fits the array before dereferencing it.<br />
<br />
Reject completion IDs that fall outside wl->tx_frames[] and keep the<br />
existing NULL check in the same guard. This keeps the fix local to the<br />
trust boundary and avoids touching the rest of the completion flow.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0fd56fad9c56356e7fa7a7c52e7ecbf807a44eb0
- https://git.kernel.org/stable/c/26ee518695c484f75e3606d631278e84bd24ae02
- https://git.kernel.org/stable/c/8d7465be5163a923ee5d7459719ef5a021c1584a
- https://git.kernel.org/stable/c/b6ba1eacf276063ebeefbbae8056043c24f2efaf
- https://git.kernel.org/stable/c/df15adc692a802636dd3f258fc7cca8bf7a0ed9a



