CVE-2026-43213
NULL Pointer Dereference in Realtek rtw89 PCI WiFi Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's wifi driver rtw89 for PCI devices. It occurs because the hardware sometimes reports an abnormal sequence number in the TX release report. When this happens, the kernel accesses an out-of-bounds element of the wd_ring->pages array, which leads to a NULL pointer dereference and causes the kernel to crash.
The issue is triggered by an invalid sequence number that is not properly validated before use. The fix involves validating the sequence number (rpp_info.seq) before accessing the array to prevent the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference triggered by an out-of-bounds array access in the wifi driver. Such a crash can lead to system instability, denial of service, or unexpected reboots, impacting the availability and reliability of systems using the affected driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability causes a kernel NULL pointer dereference leading to a crash. Detection can be done by monitoring system logs for kernel oops messages related to the rtw89_pci driver, specifically messages indicating a NULL pointer dereference or sequence number validation failure in the TX release report.
You can check the kernel logs using commands such as:
- dmesg | grep -i 'rtw89_pci'
- journalctl -k | grep -i 'NULL pointer dereference'
- journalctl -k | grep -i 'rtw89_pci_release_tx'
These commands help identify if the kernel has logged any crashes or errors related to this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the rtw89 driver includes the fix that validates the sequence number of the TX release report before use.
If an immediate update is not possible, consider disabling the affected wifi driver (rtw89) or the affected hardware temporarily to prevent kernel crashes.
Monitoring system stability and avoiding workloads that trigger the wifi TX release report may also reduce the risk until a patch is applied.