{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43113","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:55.986Z","datePublished":"2026-05-06T07:40:39.234Z","dateUpdated":"2026-05-11T22:17:59.275Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:17:59.275Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wl1251: validate packet IDs before indexing tx_frames\n\nwl1251_tx_packet_cb() uses the firmware completion ID directly to index\nthe fixed 16-entry wl->tx_frames[] array. The ID is a raw u8 from the\ncompletion block, and the callback does not currently verify that it\nfits the array before dereferencing it.\n\nReject completion IDs that fall outside wl->tx_frames[] and keep the\nexisting NULL check in the same guard. This keeps the fix local to the\ntrust boundary and avoids touching the rest of the completion flow."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/ti/wl1251/tx.c"],"versions":[{"version":"2f01a1f58889fbfeb68b1bc1b52e4197f3333490","lessThan":"b6ba1eacf276063ebeefbbae8056043c24f2efaf","status":"affected","versionType":"git"},{"version":"2f01a1f58889fbfeb68b1bc1b52e4197f3333490","lessThan":"df15adc692a802636dd3f258fc7cca8bf7a0ed9a","status":"affected","versionType":"git"},{"version":"2f01a1f58889fbfeb68b1bc1b52e4197f3333490","lessThan":"8d7465be5163a923ee5d7459719ef5a021c1584a","status":"affected","versionType":"git"},{"version":"2f01a1f58889fbfeb68b1bc1b52e4197f3333490","lessThan":"26ee518695c484f75e3606d631278e84bd24ae02","status":"affected","versionType":"git"},{"version":"2f01a1f58889fbfeb68b1bc1b52e4197f3333490","lessThan":"0fd56fad9c56356e7fa7a7c52e7ecbf807a44eb0","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/ti/wl1251/tx.c"],"versions":[{"version":"2.6.31","status":"affected"},{"version":"0","lessThan":"2.6.31","status":"unaffected","versionType":"semver"},{"version":"6.6.136","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.83","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.24","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.14","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.6.136"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.12.83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.18.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.19.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b6ba1eacf276063ebeefbbae8056043c24f2efaf"},{"url":"https://git.kernel.org/stable/c/df15adc692a802636dd3f258fc7cca8bf7a0ed9a"},{"url":"https://git.kernel.org/stable/c/8d7465be5163a923ee5d7459719ef5a021c1584a"},{"url":"https://git.kernel.org/stable/c/26ee518695c484f75e3606d631278e84bd24ae02"},{"url":"https://git.kernel.org/stable/c/0fd56fad9c56356e7fa7a7c52e7ecbf807a44eb0"}],"title":"wifi: wl1251: validate packet IDs before indexing tx_frames","x_generator":{"engine":"bippy-1.2.0"}}}}