CVE-2026-23336Expired Pointer Dereference in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() There is a use-after-free error in cfg80211_shutdown_all_interfaces found by syzkaller: BUG: KASAN: use-after-free in cfg80211_shutdown_all_interfaces+0x213/0x220 Read of size 8 at addr ffff888112a78d98 by task kworker/0:5/5326 CPU: 0 UID: 0 PID: 5326 Comm: kworker/0:5 Not tainted 6.19.0-rc2 #2 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 199

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel2.6.316.1.167+4
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linux1f87f7d3a3b42b20f34cb03f0fd1a41c3d0e27f3eeea8da43ab86ac0a6b9cec225eec91564346940+6
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

3
OSV
wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()2026-03-25
OSV
CVE-2026-23336: In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() There is a use-afte2026-03-25
GHSA
GHSA-rgr3-h3cv-574x: In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() There is a use-af2026-03-25

📋Vendor Advisories

3
Red Hat
kernel: wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()2026-03-25
Microsoft
wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()2026-03-10
Debian
CVE-2026-23336: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23336 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23336 — Expired Pointer Dereference in Linux | cvebase