Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure

ieee80211_tx_prepare_skb() has three error paths, but only two of them
free the skb. The first error path (ieee80211_tx_prepare() returning
TX_DROP) does not free it, while invoke_tx_handlers() failure and the
fragmentation check both do.

Add kfree_skb() to the first error path so all three are consistent,
and remove the now-redundant frees in callers (ath9k, mt76,
mac80211_hwsim) to avoid double-free.

Document the skb ownership guarantee in the function's kdoc.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: Kernel memory corruption
Action: Apply Patch
AI Analysis

Impact

The flaw resides in the Linux mac80211 Wi‑Fi stack where the transmit preparation routine fails to free a socket buffer consistently on error. When the first failure path is taken, the buffer is never released, leaving a dangling reference; other paths free the buffer twice. This inconsistency can corrupt kernel memory or crash the system. An attacker who can trigger the error route with crafted frames could potentially cause arbitrary code execution in kernel context.

Affected Systems

All Linux kernels that have not yet applied the fix are affected, including standard distributions that ship the default kernel for x86_64, ARM, and other architectures. The fix removes this problem from drivers such as ath9k, mt76, and mac80211_hwsim. Systems using older kernels that still contain the bug will remain vulnerable until an updated kernel is installed.

Risk and Exploitability

No CVSS score or EPSS value is provided and the vulnerability is not listed in CISA’s KEV catalog, suggesting no known active exploits. Nevertheless, the bug involves kernel memory handling, so the risk is considered high if successfully exploited. The likely attack vector involves wireless traffic: an attacker would need to send specially crafted Wi‑Fi frames that trigger the transmit‑preparation error path, or potentially exploit a local user with privileges that can cause the driver to process frames.

Generated by OpenCVE AI on April 3, 2026 at 18:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a kernel version that includes the CVE-2026-23444 fix
  • Verify that the kernel version after the update reflects the patched code
  • Ensure that all embedded Wi‑Fi drivers are updated to the latest vendor release

Generated by OpenCVE AI on April 3, 2026 at 18:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1341
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-415

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure ieee80211_tx_prepare_skb() has three error paths, but only two of them free the skb. The first error path (ieee80211_tx_prepare() returning TX_DROP) does not free it, while invoke_tx_handlers() failure and the fragmentation check both do. Add kfree_skb() to the first error path so all three are consistent, and remove the now-redundant frees in callers (ath9k, mt76, mac80211_hwsim) to avoid double-free. Document the skb ownership guarantee in the function's kdoc.
Title wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:28.464Z

Reserved: 2026-01-13T15:37:46.019Z

Link: CVE-2026-23444

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:28.810

Modified: 2026-04-03T16:16:28.810

Link: CVE-2026-23444

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23444 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:07Z

Weaknesses