CVE-2026-23396

Source
https://cve.org/CVERecord?id=CVE-2026-23396
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23396.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23396
Downstream
Published
2026-03-26T10:22:49.287Z
Modified
2026-04-02T13:12:23.856251Z
Summary
wifi: mac80211: fix NULL deref in mesh_matches_local()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix NULL deref in meshmatcheslocal()

meshmatcheslocal() unconditionally dereferences ie->meshconfig to compare mesh configuration parameters. When called from meshrxcsaframe(), the parsed action-frame elements may not contain a Mesh Configuration IE, leaving ie->mesh_config NULL and triggering a kernel NULL pointer dereference.

The other two callers are already safe: - ieee80211meshrxbcnpresp() checks !elems->meshconfig before calling meshmatcheslocal() - meshplinkgetevent() is only reached through meshprocessplinkframe(), which checks !elems->meshconfig, too

meshrxcsaframe() is the only caller that passes raw parsed elements to meshmatcheslocal() without guarding meshconfig. An adjacent attacker can exploit this by sending a crafted CSA action frame that includes a valid Mesh ID IE but omits the Mesh Configuration IE, crashing the kernel.

The captured crash log:

Oops: general protection fault, probably for non-canonical address ... KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] Workqueue: eventsunbound cfg80211wiphy_work [...] Call Trace: <TASK> ? __pfxmeshmatcheslocal (net/mac80211/mesh.c:65) ieee80211meshrxqueuedmgmt (net/mac80211/mesh.c:1686) [...] ieee80211ifacework (net/mac80211/iface.c:1754 net/mac80211/iface.c:1802) [...] cfg80211wiphywork (net/wireless/core.c:426) processonework (net/kernel/workqueue.c:3280) ? assignwork (net/kernel/workqueue.c:1219) worker_thread (net/kernel/workqueue.c:3352) ? __pfxworkerthread (net/kernel/workqueue.c:3385) kthread (net/kernel/kthread.c:436) [...] retfromforkasm (net/arch/x86/entry/entry64.S:255) </TASK>

This patch adds a NULL check for ie->meshconfig at the top of meshmatches_local() to return false early when the Mesh Configuration IE is absent.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23396.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2e3c8736820bf72a8ad10721c7e31d36d4fa7790
Fixed
c1e3f2416fb27c816ce96d747d3e784e31f4d95c
Fixed
0a4da176ae4b4e075a19c00d3e269cfd5e05a813
Fixed
a90279e7f7ea0b7e923a1c5ebee9a6b78b6d1004
Fixed
44699c6cdfce80a0f296b54ae9314461e3e41b3d
Fixed
7c55a3deaf7eaaafa2546f8de7fed19382a0a116
Fixed
c73bb9a2d33bf81f6eecaa0f474b6c6dbe9855bd

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23396.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.26
Fixed
6.1.167
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.78
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.20
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23396.json"