wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom
Summary
| CVE | CVE-2026-31552 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-24 15:16:29 UTC |
| Updated | 2026-04-27 20:15:16 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom Since upstream commit e75665dd0968 ("wifi: wlcore: ensure skb headroom before skb_push"), wl1271_tx_allocate() and with it wl1271_prepare_tx_frame() returns -EAGAIN if pskb_expand_head() fails. However, in wlcore_tx_work_locked(), a return value of -EAGAIN from wl1271_prepare_tx_frame() is interpreted as the aggregation buffer being full. This causes the code to flush the buffer, put the skb back at the head of the queue, and immediately retry the same skb in a tight while loop. Because wlcore_tx_work_locked() holds wl->mutex, and the retry happens immediately with GFP_ATOMIC, this will result in an infinite loop and a CPU soft lockup. Return -ENOMEM instead so the packet is dropped and the loop terminates. The problem was found by an experimental code review agent based on gemini-3.1-pro while reviewing backports into v6.18.y. |
Risk And Classification
Primary CVSS: v3.1 7.5 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.000240000 probability, percentile 0.067850000 (date 2026-04-27)
Problem Types: CWE-835
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | CNA | DECLARED | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 88295a55fefe5414e64293638b6f7549646e58ed 980f793645540ca7a6318165cc12f49d5febeb99 git | Not specified |
| CNA | Linux | Linux | affected cd89a4656c03f8db0c57350aaec69cd3cfaa3522 12f9eef39e49716c763714bfda835a733d5f6dea git | Not specified |
| CNA | Linux | Linux | affected 745a0810dbc96a0471e5f5e627ba1e978c3116d4 ceb46b40b021d21911ff8608ce4ed33c1264ad2f git | Not specified |
| CNA | Linux | Linux | affected b167312390fdd461c81ead516f2b0b44e83a9edb a6dc74209462c4fe5a88718d2f3a5286886081c8 git | Not specified |
| CNA | Linux | Linux | affected 71de0b6e04bbee5575caf9a1e4d424e7dcc50018 cfa64e2b3717be1da7c4c1aff7268a009e8c1610 git | Not specified |
| CNA | Linux | Linux | affected 689a7980e4788e13e766763d53569fb78dea2513 46c670ff1ff466e5eccb3940f726586473dc053c git | Not specified |
| CNA | Linux | Linux | affected e75665dd096819b1184087ba5718bd93beafff51 f2c06d718a7b85cbc59ceaa2ff3f46b178ac709c git | Not specified |
| CNA | Linux | Linux | affected e75665dd096819b1184087ba5718bd93beafff51 deb353d9bb009638b7762cae2d0b6e8fdbb41a69 git | Not specified |
| CNA | Linux | Linux | affected 6.19 | Not specified |
| CNA | Linux | Linux | unaffected 6.19 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.167 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.78 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.20 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.10 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/a6dc74209462c4fe5a88718d2f3a5286886081c8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/deb353d9bb009638b7762cae2d0b6e8fdbb41a69 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ceb46b40b021d21911ff8608ce4ed33c1264ad2f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/12f9eef39e49716c763714bfda835a733d5f6dea | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f2c06d718a7b85cbc59ceaa2ff3f46b178ac709c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/46c670ff1ff466e5eccb3940f726586473dc053c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/980f793645540ca7a6318165cc12f49d5febeb99 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/cfa64e2b3717be1da7c4c1aff7268a009e8c1610 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.