← Voltar para CVEs
CVE-2026-43113
N/ADescricao
In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet IDs before indexing tx_frames wl1251_tx_packet_cb() uses the firmware completion ID directly to index the fixed 16-entry wl->tx_frames[] array. The ID is a raw u8 from the completion block, and the callback does not currently verify that it fits the array before dereferencing it. Reject completion IDs that fall outside wl->tx_frames[] and keep the existing NULL check in the same guard. This keeps the fix local to the trust boundary and avoids touching the rest of the completion flow.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado5/6/2026
Ultima modificacao5/6/2026
Fontenvd
Avistamentos honeypot0
Referencias
https://git.kernel.org/stable/c/0fd56fad9c56356e7fa7a7c52e7ecbf807a44eb0(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/26ee518695c484f75e3606d631278e84bd24ae02(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/8d7465be5163a923ee5d7459719ef5a021c1584a(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/b6ba1eacf276063ebeefbbae8056043c24f2efaf(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/df15adc692a802636dd3f258fc7cca8bf7a0ed9a(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.