In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mld: cancel mloscanstart_wk
mloscanstart_wk is not canceled on disconnection. In fact, it is not canceled anywhere except in the restart cleanup, where we don't really have to.
This can cause an init-after-queue issue: if, for example, the work was queued and then drvchangeinterface got executed.
This can also cause use-after-free: if the work is executed after the vif is freed.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23185.json",
"cna_assigner": "Linux"
}