Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation

The variable valuesize is declared as u8 but accumulates the total
length of all SSIDs to scan. Each SSID contributes up to 33 bytes
(IEEE80211_MAX_SSID_LEN + 1), and with WILC_MAX_NUM_PROBED_SSID (10)
SSIDs the total can reach 330, which wraps around to 74 when stored
in a u8.

This causes kmalloc to allocate only 75 bytes while the subsequent
memcpy writes up to 331 bytes into the buffer, resulting in a 256-byte
heap buffer overflow.

Widen valuesize from u8 to u32 to accommodate the full range.
Published: 2026-05-01
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A cumulative integer wrap‑around in the WiLCoW1000 WiFi driver causes a heap buffer overflow during SSID scanning. The driver stores the total size of SSIDs to be scanned in a u8 field, but up to ten SSIDs can collectively require 330 bytes. The 8‑bit counter wraps to 74, leading kmalloc to allocate only 75 bytes while a later memcpy writes up to 331 bytes, overwriting 256 bytes of heap memory. This out‑of‑bounds write can corrupt heap structures, potentially allowing an attacker to execute arbitrary code or induce a system crash.

Affected Systems

The flaw exists in the wilc1000 driver bundled with the Linux kernel. Any Linux system that includes the module prior to the patch is vulnerable; the exact affected kernel release is not specified, so systems using the driver before the update are at risk.

Risk and Exploitability

No public CVSS or EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog. The overflow is considerable and can lead to remote code execution or denial of service, requiring an attacker to trigger a scan, which can be achieved by manipulating the wireless interface locally or by creating a malicious wireless environment that forces the device to scan. The severity warrants fast remediation.

Generated by OpenCVE AI on May 2, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that incorporates the patch widening valuesize to u32
  • Restart the system to load the updated driver and ensure the fix is active
  • If no patch is currently available, disable the wilc1000 module or block SSID scanning to prevent the overflow condition
  • Check that the kernel configuration does not include the wilc1000 module if it is not required

Generated by OpenCVE AI on May 2, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-680

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation The variable valuesize is declared as u8 but accumulates the total length of all SSIDs to scan. Each SSID contributes up to 33 bytes (IEEE80211_MAX_SSID_LEN + 1), and with WILC_MAX_NUM_PROBED_SSID (10) SSIDs the total can reach 330, which wraps around to 74 when stored in a u8. This causes kmalloc to allocate only 75 bytes while the subsequent memcpy writes up to 331 bytes into the buffer, resulting in a 256-byte heap buffer overflow. Widen valuesize from u8 to u32 to accommodate the full range.
Title wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:07.253Z

Reserved: 2026-03-09T15:48:24.141Z

Link: CVE-2026-31780

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:41.453

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31780

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:30:40Z

Weaknesses