CVE-2026-23396
NULL Pointer Dereference in Linux mac80211 Mesh Frame Processing
Publication date: 2026-03-26
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 2.6.26 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.2 (inc) to 6.6.130 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.203 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.167 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.78 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.20 (exc) |
| linux | linux_kernel | From 6.19 (inc) to 6.19.10 (exc) |
| linux | linux_kernel | From 2.6.26.1 (inc) to 5.10.253 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not include any details about how this vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's wifi mac80211 component, specifically in the function mesh_matches_local(). The function mesh_matches_local() dereferences a pointer ie->mesh_config without checking if it is NULL. When mesh_matches_local() is called from mesh_rx_csa_frame(), the parsed action-frame elements may lack a Mesh Configuration Information Element (IE), causing ie->mesh_config to be NULL. This leads to a kernel NULL pointer dereference and a crash.
An attacker adjacent to the vulnerable system can exploit this by sending a specially crafted CSA action frame that includes a valid Mesh ID IE but omits the Mesh Configuration IE, triggering the kernel crash.
The vulnerability was fixed by adding a NULL check for ie->mesh_config at the start of mesh_matches_local(), which returns false early if the Mesh Configuration IE is missing, preventing the NULL pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when processing certain mesh network frames. This results in a denial of service (DoS) condition, where the affected system becomes unstable or unresponsive.
An adjacent attacker can exploit this by sending crafted wireless frames, potentially disrupting network connectivity and system availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by a patch that adds a NULL check for ie->mesh_config in the mesh_matches_local() function to prevent kernel crashes.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this patch.