Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43176
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:27
Updated At-11 May, 2026 | 22:19
Rejected At-
▼CVE Numbering Authority (CNA)
wifi: rtw89: pci: validate release report content before using for RTL8922DE

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate release report content before using for RTL8922DE The commit 957eda596c76 ("wifi: rtw89: pci: validate sequence number of TX release report") does validation on existing chips, which somehow a release report of SKB becomes malformed. As no clear cause found, add rules ahead for RTL8922DE to avoid crash if it happens.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/realtek/rtw89/pci.c
Default Status
unaffected
Versions
Affected
  • From 110f3c11f440d78ef8a181f75456e24e428f69e4 before ebeaa3b24ba568ff8505165f954dba15cc53e4b3 (git)
  • From 110f3c11f440d78ef8a181f75456e24e428f69e4 before 3e8a88b5e8b3506d9c5e031a65ba65ce9a0683a3 (git)
  • From 110f3c11f440d78ef8a181f75456e24e428f69e4 before 5f93d611b33a05bd03d6843c8efe8cb6a1992620 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/realtek/rtw89/pci.c
Default Status
affected
Versions
Affected
  • 6.18
Unaffected
  • From 0 before 6.18 (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/ebeaa3b24ba568ff8505165f954dba15cc53e4b3
N/A
https://git.kernel.org/stable/c/3e8a88b5e8b3506d9c5e031a65ba65ce9a0683a3
N/A
https://git.kernel.org/stable/c/5f93d611b33a05bd03d6843c8efe8cb6a1992620
N/A
Hyperlink: https://git.kernel.org/stable/c/ebeaa3b24ba568ff8505165f954dba15cc53e4b3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3e8a88b5e8b3506d9c5e031a65ba65ce9a0683a3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5f93d611b33a05bd03d6843c8efe8cb6a1992620
Resource: N/A
Details not found