CVE-2026-43267
Awaiting Analysis Awaiting Analysis - Queue
Division by Zero in Linux Kernel WiFi Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential zero beacon interval in beacon tracking During fuzz testing, it was discovered that bss_conf->beacon_int might be zero, which could result in a division by zero error in subsequent calculations. Set a default value of 100 TU if the interval is zero to ensure stability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
linux_kernel wifi 0
linux linux_kernel *
linux_kernel wifi *-*
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

If the beacon interval is zero, it could cause a division by zero error in the wifi driver, which may lead to system instability or crashes. This could disrupt wireless network functionality on affected Linux systems, potentially causing loss of connectivity or degraded performance.


Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's wifi driver rtw89. During fuzz testing, it was found that the beacon interval value (bss_conf->beacon_int) could be zero. Since this value is used in calculations, a zero value could cause a division by zero error, potentially leading to instability or crashes. The fix sets a default beacon interval value of 100 TU (time units) if the interval is zero to prevent this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart