CVE-2026-23336

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() There is a use-after-free error in cfg80211_shutdown_all_interfaces found by syzkaller: BUG: KASAN: use-after-free in cfg80211_shutdown_all_interfaces+0x213/0x220 Read of size 8 at addr ffff888112a78d98 by task kworker/0:5/5326 CPU: 0 UID: 0 PID: 5326 Comm: kworker/0:5 Not tainted 6.19.0-rc2 #2 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Workqueue: events cfg80211_rfkill_block_work Call Trace: <TASK> dump_stack_lvl+0x116/0x1f0 print_report+0xcd/0x630 kasan_report+0xe0/0x110 cfg80211_shutdown_all_interfaces+0x213/0x220 cfg80211_rfkill_block_work+0x1e/0x30 process_one_work+0x9cf/0x1b70 worker_thread+0x6c8/0xf10 kthread+0x3c5/0x780 ret_from_fork+0x56d/0x700 ret_from_fork_asm+0x1a/0x30 </TASK> The problem arises due to the rfkill_block work is not cancelled when wiphy is being unregistered. In order to fix the issue cancel the corresponding work in wiphy_unregister(). Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

23 Apr 2026, 21:12

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/57e39fe8da573435fa35975f414f4dc17d9f8449 - () https://git.kernel.org/stable/c/57e39fe8da573435fa35975f414f4dc17d9f8449 - Patch
References () https://git.kernel.org/stable/c/584279ad9ff1e8e7c5494b9fce286201f7d1f9e2 - () https://git.kernel.org/stable/c/584279ad9ff1e8e7c5494b9fce286201f7d1f9e2 - Patch
References () https://git.kernel.org/stable/c/767d23ade706d5fa51c36168e92a9c5533c351a1 - () https://git.kernel.org/stable/c/767d23ade706d5fa51c36168e92a9c5533c351a1 - Patch
References () https://git.kernel.org/stable/c/82a35356b5c1f75fe6a8a561db44e8d0e49da8f9 - () https://git.kernel.org/stable/c/82a35356b5c1f75fe6a8a561db44e8d0e49da8f9 - Patch
References () https://git.kernel.org/stable/c/b2e9626a9d16b9bbbd06498c9e73c93be354dc7a - () https://git.kernel.org/stable/c/b2e9626a9d16b9bbbd06498c9e73c93be354dc7a - Patch
References () https://git.kernel.org/stable/c/cd2f52944c7b95dcdfe0d87f385a2d96458a3ae5 - () https://git.kernel.org/stable/c/cd2f52944c7b95dcdfe0d87f385a2d96458a3ae5 - Patch
References () https://git.kernel.org/stable/c/eeea8da43ab86ac0a6b9cec225eec91564346940 - () https://git.kernel.org/stable/c/eeea8da43ab86ac0a6b9cec225eec91564346940 - Patch
References () https://git.kernel.org/stable/c/fa18639deab4a3662d543200c5bfc29bf4e23173 - () https://git.kernel.org/stable/c/fa18639deab4a3662d543200c5bfc29bf4e23173 - Patch
CWE CWE-416
First Time Linux
Linux linux Kernel

18 Apr 2026, 09:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/82a35356b5c1f75fe6a8a561db44e8d0e49da8f9 -
  • () https://git.kernel.org/stable/c/b2e9626a9d16b9bbbd06498c9e73c93be354dc7a -

02 Apr 2026, 15:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: wifi: cfg80211: cancelar el trabajo rfkill_block en wiphy_unregister() Existe un error de uso después de liberación en cfg80211_shutdown_all_interfaces encontrado por syzkaller: BUG: KASAN: uso después de liberación en cfg80211_shutdown_all_interfaces+0x213/0x220 Lectura de tamaño 8 en la dirección ffff888112a78d98 por la tarea kworker/0:5/5326 CPU: 0 UID: 0 PID: 5326 Comm: kworker/0:5 No contaminado 6.19.0-rc2 #2 PREEMPT(voluntario) Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Cola de trabajo: eventos cfg80211_rfkill_block_work Rastro de llamada: dump_stack_lvl+0x116/0x1f0 print_report+0xcd/0x630 kasan_report+0xe0/0x110 cfg80211_shutdown_all_interfaces+0x213/0x220 cfg80211_rfkill_block_work+0x1e/0x30 process_one_work+0x9cf/0x1b70 worker_thread+0x6c8/0xf10 kthread+0x3c5/0x780 ret_from_fork+0x56d/0x700 ret_from_fork_asm+0x1a/0x30 El problema surge debido a que el trabajo rfkill_block no se cancela cuando wiphy está siendo desregistrado. Para solucionar el problema, cancele el trabajo correspondiente en wiphy_unregister(). Encontrado por Linux Verification Center (linuxtesting.org) con Syzkaller.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

25 Mar 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 11:16

Updated : 2026-04-23 21:12


NVD link : CVE-2026-23336

Mitre link : CVE-2026-23336

CVE.ORG link : CVE-2026-23336


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free