-

CVE-2026-23281

wifi: libertas: fix use-after-free in lbs_free_adapter()

In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix use-after-free in lbs_free_adapter()

The lbs_free_adapter() function uses timer_delete() (non-synchronous)
for both command_timer and tx_lockup_timer before the structure is
freed. This is incorrect because timer_delete() does not wait for
any running timer callback to complete.

If a timer callback is executing when lbs_free_adapter() is called,
the callback will access freed memory since lbs_cfg_free() frees the
containing structure immediately after lbs_free_adapter() returns.

Both timer callbacks (lbs_cmd_timeout_handler and lbs_tx_lockup_handler)
access priv->driver_lock, priv->cur_cmd, priv->dev, and other fields,
which would all be use-after-free violations.

Use timer_delete_sync() instead to ensure any running timer callback
has completed before returning.

This bug was introduced in commit 8f641d93c38a ("libertas: detect TX
lockups and reset hardware") where del_timer() was used instead of
del_timer_sync() in the cleanup path. The command_timer has had the
same issue since the driver was first written.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < b15e0fa7adb4de3a03aee9e6fc4d83e5cf0a65e4
Status affected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < 09f3c30ab3b1371eaf9676a1b8add57bca763083
Status affected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < 3f9dec4a6d95d7f1f5e9e9dfdfa173c053bba8dc
Status affected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < 3c5c818c78b03a1725f3dcd566865c77b48dd3a6
Status affected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < d0155fe68f31b339961cf2d4f92937d57e9384e6
Status affected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < ed7d30f90b77f73a47498686ede83f622b7e4f0d
Status affected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < a9f55b14486426d907459bced5825a25063bd922
Status affected
Version 954ee164f4f4598afc172c0ec3865d0352e55a0b
Version < 03cc8f90d0537fcd4985c3319b4fafbf2e3fb1f0
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.24
Status affected
Version 0
Version < 2.6.24
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.17
Status unaffected
Version <= 6.19.*
Version 6.19.7
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.102
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.