CVE-2026-23281

Source
https://cve.org/CVERecord?id=CVE-2026-23281
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23281.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23281
Downstream
Published
2026-03-25T10:26:41.844Z
Modified
2026-04-02T13:12:20.336380Z
Summary
wifi: libertas: fix use-after-free in lbs_free_adapter()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix use-after-free in lbsfreeadapter()

The lbsfreeadapter() function uses timerdelete() (non-synchronous) for both commandtimer and txlockuptimer before the structure is freed. This is incorrect because timer_delete() does not wait for any running timer callback to complete.

If a timer callback is executing when lbsfreeadapter() is called, the callback will access freed memory since lbscfgfree() frees the containing structure immediately after lbsfreeadapter() returns.

Both timer callbacks (lbscmdtimeouthandler and lbstxlockuphandler) access priv->driverlock, priv->curcmd, priv->dev, and other fields, which would all be use-after-free violations.

Use timerdeletesync() instead to ensure any running timer callback has completed before returning.

This bug was introduced in commit 8f641d93c38a ("libertas: detect TX lockups and reset hardware") where deltimer() was used instead of deltimersync() in the cleanup path. The commandtimer has had the same issue since the driver was first written.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23281.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
954ee164f4f4598afc172c0ec3865d0352e55a0b
Fixed
3f9dec4a6d95d7f1f5e9e9dfdfa173c053bba8dc
Fixed
3c5c818c78b03a1725f3dcd566865c77b48dd3a6
Fixed
d0155fe68f31b339961cf2d4f92937d57e9384e6
Fixed
ed7d30f90b77f73a47498686ede83f622b7e4f0d
Fixed
a9f55b14486426d907459bced5825a25063bd922
Fixed
03cc8f90d0537fcd4985c3319b4fafbf2e3fb1f0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23281.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.24
Fixed
6.1.167
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.78
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23281.json"