Impact
The issue originates from an unchecked dereference of the Mesh Configuration element within the mesh_matches_local function in the Linux kernel’s mac80211 subsystem. When a CSA action frame is received that contains a Mesh ID IE but omits the Mesh Configuration IE, the function dereferences a null pointer, triggering a kernel panic. This constitutes a denial‑of‑service vulnerability and falls under CWE-476.
Affected Systems
All Linux kernels that include the mac80211 mesh networking stack are impacted. The affected vendors list only "Linux" and no specific version numbers are provided, so any kernel build that predates the patch that adds a null check is vulnerable. This includes typical distributions that ship the upstream kernel.
Risk and Exploitability
The EPSS score is reported as < 1 % and the vulnerability is not listed in the CISA KEV catalog, indicating a low probability of widespread exploitation. The likely attack vector is a remote wireless adversary that can transmit a crafted CSA action frame. Based on the description, the attacker can send a frame that includes a Mesh ID IE while omitting the Mesh Configuration IE, causing the null dereference. Exploitation requires the device to have mesh networking enabled and the ability to process malformed CSA frames, which limits the attack surface to wireless interfaces exposing the mesh feature.
OpenCVE Enrichment