CVE-2026-23336 PUBLISHED

wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()

Assigner: Linux
Reserved: 13.01.2026 Published: 25.03.2026 Updated: 25.03.2026

In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()

There is a use-after-free error in cfg80211_shutdown_all_interfaces found by syzkaller:

BUG: KASAN: use-after-free in cfg80211_shutdown_all_interfaces+0x213/0x220 Read of size 8 at addr ffff888112a78d98 by task kworker/0:5/5326 CPU: 0 UID: 0 PID: 5326 Comm: kworker/0:5 Not tainted 6.19.0-rc2 #2 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Workqueue: events cfg80211_rfkill_block_work Call Trace: <TASK> dump_stack_lvl+0x116/0x1f0 print_report+0xcd/0x630 kasan_report+0xe0/0x110 cfg80211_shutdown_all_interfaces+0x213/0x220 cfg80211_rfkill_block_work+0x1e/0x30 process_one_work+0x9cf/0x1b70 worker_thread+0x6c8/0xf10 kthread+0x3c5/0x780 ret_from_fork+0x56d/0x700 ret_from_fork_asm+0x1a/0x30 </TASK>

The problem arises due to the rfkill_block work is not cancelled when wiphy is being unregistered. In order to fix the issue cancel the corresponding work in wiphy_unregister().

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1f87f7d3a3b42b20f34cb03f0fd1a41c3d0e27f3 to eeea8da43ab86ac0a6b9cec225eec91564346940 (excl.)
  • affected from 1f87f7d3a3b42b20f34cb03f0fd1a41c3d0e27f3 to fa18639deab4a3662d543200c5bfc29bf4e23173 (excl.)
  • affected from 1f87f7d3a3b42b20f34cb03f0fd1a41c3d0e27f3 to 57e39fe8da573435fa35975f414f4dc17d9f8449 (excl.)
  • affected from 1f87f7d3a3b42b20f34cb03f0fd1a41c3d0e27f3 to 584279ad9ff1e8e7c5494b9fce286201f7d1f9e2 (excl.)
  • affected from 1f87f7d3a3b42b20f34cb03f0fd1a41c3d0e27f3 to cd2f52944c7b95dcdfe0d87f385a2d96458a3ae5 (excl.)
  • affected from 1f87f7d3a3b42b20f34cb03f0fd1a41c3d0e27f3 to 767d23ade706d5fa51c36168e92a9c5533c351a1 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 2.6.31 is affected
  • unaffected from 0 to 2.6.31 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.77 to 6.12.* (incl.)
  • unaffected from 6.18.17 to 6.18.* (incl.)
  • unaffected from 6.19.7 to 6.19.* (incl.)
  • unaffected from 7.0-rc2 to * (incl.)

References