๐Ÿ” CVE Alert

CVE-2026-23279

UNKNOWN 0.0

wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() In mesh_rx_csa_frame(), elems->mesh_chansw_params_ie is dereferenced at lines 1638 and 1642 without a prior NULL check: ifmsh->chsw_ttl = elems->mesh_chansw_params_ie->mesh_ttl; ... pre_value = le16_to_cpu(elems->mesh_chansw_params_ie->mesh_pre_value); The mesh_matches_local() check above only validates the Mesh ID, Mesh Configuration, and Supported Rates IEs. It does not verify the presence of the Mesh Channel Switch Parameters IE (element ID 118). When a received CSA action frame omits that IE, ieee802_11_parse_elems() leaves elems->mesh_chansw_params_ie as NULL, and the unconditional dereference causes a kernel NULL pointer dereference. A remote mesh peer with an established peer link (PLINK_ESTAB) can trigger this by sending a crafted SPECTRUM_MGMT/CHL_SWITCH action frame that includes a matching Mesh ID and Mesh Configuration IE but omits the Mesh Channel Switch Parameters IE. No authentication beyond the default open mesh peering is required. Crash confirmed on kernel 6.17.0-5-generic via mac80211_hwsim: BUG: kernel NULL pointer dereference, address: 0000000000000000 Oops: Oops: 0000 [#1] SMP NOPTI RIP: 0010:ieee80211_mesh_rx_queued_mgmt+0x143/0x2a0 [mac80211] CR2: 0000000000000000 Fix by adding a NULL check for mesh_chansw_params_ie after mesh_matches_local() returns, consistent with how other optional IEs are guarded throughout the mesh code. The bug has been present since v3.13 (released 2014-01-19).

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 25, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8f2535b92d685c68db4bc699dd78462a646f6ef9 < 2b5f282b1b7241ef624c3399a1cdff0bb1a3eeab 8f2535b92d685c68db4bc699dd78462a646f6ef9 < 22a9adea7e26d236406edc0ea00b54351dd56b9c 8f2535b92d685c68db4bc699dd78462a646f6ef9 < f5d8af683410a8c82e48b51291915bd612523d9a 8f2535b92d685c68db4bc699dd78462a646f6ef9 < cc6d5a3c0a854aeae00915fc5386570c86029c60 8f2535b92d685c68db4bc699dd78462a646f6ef9 < be8b82c567fda86f2cbb43b7208825125bb31421 8f2535b92d685c68db4bc699dd78462a646f6ef9 < 017c1792525064a723971f0216e6ef86a8c7af11
Linux / Linux
3.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2b5f282b1b7241ef624c3399a1cdff0bb1a3eeab git.kernel.org: https://git.kernel.org/stable/c/22a9adea7e26d236406edc0ea00b54351dd56b9c git.kernel.org: https://git.kernel.org/stable/c/f5d8af683410a8c82e48b51291915bd612523d9a git.kernel.org: https://git.kernel.org/stable/c/cc6d5a3c0a854aeae00915fc5386570c86029c60 git.kernel.org: https://git.kernel.org/stable/c/be8b82c567fda86f2cbb43b7208825125bb31421 git.kernel.org: https://git.kernel.org/stable/c/017c1792525064a723971f0216e6ef86a8c7af11