-

CVE-2026-23279

wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame()

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame()

In mesh_rx_csa_frame(), elems->mesh_chansw_params_ie is dereferenced
at lines 1638 and 1642 without a prior NULL check:

    ifmsh->chsw_ttl = elems->mesh_chansw_params_ie->mesh_ttl;
    ...
    pre_value = le16_to_cpu(elems->mesh_chansw_params_ie->mesh_pre_value);

The mesh_matches_local() check above only validates the Mesh ID,
Mesh Configuration, and Supported Rates IEs.  It does not verify the
presence of the Mesh Channel Switch Parameters IE (element ID 118).
When a received CSA action frame omits that IE, ieee802_11_parse_elems()
leaves elems->mesh_chansw_params_ie as NULL, and the unconditional
dereference causes a kernel NULL pointer dereference.

A remote mesh peer with an established peer link (PLINK_ESTAB) can
trigger this by sending a crafted SPECTRUM_MGMT/CHL_SWITCH action frame
that includes a matching Mesh ID and Mesh Configuration IE but omits the
Mesh Channel Switch Parameters IE.  No authentication beyond the default
open mesh peering is required.

Crash confirmed on kernel 6.17.0-5-generic via mac80211_hwsim:

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  Oops: Oops: 0000 [#1] SMP NOPTI
  RIP: 0010:ieee80211_mesh_rx_queued_mgmt+0x143/0x2a0 [mac80211]
  CR2: 0000000000000000

Fix by adding a NULL check for mesh_chansw_params_ie after
mesh_matches_local() returns, consistent with how other optional IEs
are guarded throughout the mesh code.

The bug has been present since v3.13 (released 2014-01-19).
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < 753ad20dcbe36b67088c7770d8fc357d7cc43e08
Status affected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < f061336f072ab03fd29270ae61fede46bf8fd69d
Status affected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < 2b5f282b1b7241ef624c3399a1cdff0bb1a3eeab
Status affected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < 22a9adea7e26d236406edc0ea00b54351dd56b9c
Status affected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < f5d8af683410a8c82e48b51291915bd612523d9a
Status affected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < cc6d5a3c0a854aeae00915fc5386570c86029c60
Status affected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < be8b82c567fda86f2cbb43b7208825125bb31421
Status affected
Version 8f2535b92d685c68db4bc699dd78462a646f6ef9
Version < 017c1792525064a723971f0216e6ef86a8c7af11
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.13
Status affected
Version 0
Version < 3.13
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.77
Status unaffected
Version <= 6.18.*
Version 6.18.17
Status unaffected
Version <= 6.19.*
Version 6.19.7
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.13% 0.316
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.