SB20260325116 - Use After Free in Linux kernel wireless
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use After Free (CVE-ID: CVE-2026-23336)
The vulnerability allows a local user to execute arbitrary code or cause a denial of service.
The vulnerability exists due to a use-after-free error in the cfg80211 component when unregistering a wiphy device. A local user can trigger the cancellation of rfkill_block work during wiphy unregistration to execute arbitrary code or cause a denial of service.
The issue arises because the rfkill_block work is not properly cancelled when the wiphy is being unregistered, leading to a use-after-free condition upon subsequent access.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/57e39fe8da573435fa35975f414f4dc17d9f8449
- https://git.kernel.org/stable/c/584279ad9ff1e8e7c5494b9fce286201f7d1f9e2
- https://git.kernel.org/stable/c/767d23ade706d5fa51c36168e92a9c5533c351a1
- https://git.kernel.org/stable/c/cd2f52944c7b95dcdfe0d87f385a2d96458a3ae5
- https://git.kernel.org/stable/c/eeea8da43ab86ac0a6b9cec225eec91564346940
- https://git.kernel.org/stable/c/fa18639deab4a3662d543200c5bfc29bf4e23173