Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-31552— wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom

CVSS 7.5 · High EPSS 0.07% · P21

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux88295a55fefe5414e64293638b6f7549646e58ed< 980f793645540ca7a6318165cc12f49d5febeb99affected
cd89a4656c03f8db0c57350aaec69cd3cfaa3522< 12f9eef39e49716c763714bfda835a733d5f6deaaffected
745a0810dbc96a0471e5f5e627ba1e978c3116d4< ceb46b40b021d21911ff8608ce4ed33c1264ad2faffected
b167312390fdd461c81ead516f2b0b44e83a9edb< a6dc74209462c4fe5a88718d2f3a5286886081c8affected
71de0b6e04bbee5575caf9a1e4d424e7dcc50018< cfa64e2b3717be1da7c4c1aff7268a009e8c1610affected
689a7980e4788e13e766763d53569fb78dea2513< 46c670ff1ff466e5eccb3940f726586473dc053caffected
e75665dd096819b1184087ba5718bd93beafff51< f2c06d718a7b85cbc59ceaa2ff3f46b178ac709caffected
e75665dd096819b1184087ba5718bd93beafff51< deb353d9bb009638b7762cae2d0b6e8fdbb41a69affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-31552

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom Since upstream commit e75665dd0968 ("wifi: wlcore: ensure skb headroom before skb_push"), wl1271_tx_allocate() and with it wl1271_prepare_tx_frame() returns -EAGAIN if pskb_expand_head() fails. However, in wlcore_tx_work_locked(), a return value of -EAGAIN from wl1271_prepare_tx_frame() is interpreted as the aggregation buffer being full. This causes the code to flush the buffer, put the skb back at the head of the queue, and immediately retry the same skb in a tight while loop. Because wlcore_tx_work_locked() holds wl->mutex, and the retry happens immediately with GFP_ATOMIC, this will result in an infinite loop and a CPU soft lockup. Return -ENOMEM instead so the packet is dropped and the loop terminates. The problem was found by an experimental code review agent based on gemini-3.1-pro while reviewing backports into v6.18.y.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于wl1271_tx_allocate函数在pskb_expand_head失败时返回-EAGAIN,被错误解释为聚合缓冲区已满,导致无限循环和CPU软锁定。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 88295a55fefe5414e64293638b6f7549646e58ed ~ 980f793645540ca7a6318165cc12f49d5febeb99 -
LinuxLinux 6.19 -

II. Public POCs for CVE-2026-31552

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-31552

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-04-24 · 138 CVEs total

CVE-2026-316499.8 CRITICALnet: stmmac: fix integer underflow in chain mode
CVE-2026-316079.8 CRITICALusbip: validate number_of_packets in usbip_pack_ret_submit()
CVE-2026-315369.8 CRITICALsmb: server: let send_done handle a completion without IB_SEND_SIGNALED
CVE-2026-316339.8 CRITICALrxrpc: Fix integer overflow in rxgk_verify_response()
CVE-2026-316089.8 CRITICALsmb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list
CVE-2026-316699.8 CRITICALmptcp: fix slab-use-after-free in __inet_lookup_established
CVE-2026-316689.8 CRITICALseg6: separate dst_cache for input and output paths in seg6 lwtunnel
CVE-2026-315899.8 CRITICALmm: call ->free_folio() directly in folio_unmap_invalidate()
CVE-2026-316099.8 CRITICALsmb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()
CVE-2026-316579.8 CRITICALbatman-adv: hold claim backbone gateways by reference
CVE-2026-316599.8 CRITICALbatman-adv: reject oversized global TT response buffers
CVE-2026-316379.8 CRITICALrxrpc: reject undecryptable rxkad response tickets
CVE-2026-316369.1 CRITICALrxrpc: fix RESPONSE authenticator parser OOB read
CVE-2026-315708.8 HIGHcan: gw: fix OOB heap access in cgw_csum_crc8_rel()
CVE-2026-315588.8 HIGHLoongArch: KVM: Make kvm_get_vcpu_by_cpuid() more robust
CVE-2026-315538.8 HIGHKVM: arm64: Fix the descriptor address in __kvm_at_swap_desc()
CVE-2026-316228.8 HIGHNFC: digital: Bounds check NFC-A cascade depth in SDD response handler
CVE-2026-315888.8 HIGHKVM: x86: Use scratch field in MMIO fragment to hold small write values
CVE-2026-316298.8 HIGHnfc: llcp: add missing return after LLCP_CLOSED checks
CVE-2026-316118.6 HIGHksmbd: require 3 sub-authorities before reading sub_auth[2]

Showing top 20 of 138 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-31552

No comments yet


Leave a comment