Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23246

Опубликовано: 18 мар. 2026
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

A flaw was found in the Linux kernel's mac80211 Wi-Fi subsystem. This vulnerability occurs in the ieee80211_ml_reconfiguration function when processing a Multi-Link (ML) Reconfiguration element. An attacker can provide a crafted link_id value that is not properly bounds-checked, leading to an out-of-bounds write on the stack. This can result in a denial of service (DoS), potentially making the system unavailable.

Отчет

A stack out of bounds write in mac80211 can occur when parsing the ML Reconfiguration element because link_id can be 15 while link_removal_timeout only has 15 entries indexed 0 to 14. A nearby attacker can potentially trigger this by injecting crafted 80211 management frames that include ML Reconfiguration subelements with an invalid link_id. For the CVSS the PR:N is used for the upper boundary score level because the attacker does not need any privileges and only needs radio proximity to the WiFi interface that processes such frames. The issue is adjacency network reachable over the wireless medium rather than the public Internet. Impact is at least denial of service via kernel crash. For the CIA of the CVSS only considering A:H, but still considering a limited integrity impact possibility because the bug class is a stack out of bounds write and may be exploitable in some environments.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelAffected
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelAffected
Red Hat Enterprise Linux 9kernel-rtAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2448600kernel: Linux kernel: Denial of Service in mac80211 Wi-Fi due to out-of-bounds write

EPSS

Процентиль: 6%
0.00024
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

ubuntu
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration link_id is taken from the ML Reconfiguration element (control & 0x000f), so it can be 0..15. link_removal_timeout[] has IEEE80211_MLD_MAX_NUM_LINKS (15) elements, so index 15 is out-of-bounds. Skip subelements with link_id >= IEEE80211_MLD_MAX_NUM_LINKS to avoid a stack out-of-bounds write.

nvd
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration link_id is taken from the ML Reconfiguration element (control & 0x000f), so it can be 0..15. link_removal_timeout[] has IEEE80211_MLD_MAX_NUM_LINKS (15) elements, so index 15 is out-of-bounds. Skip subelements with link_id >= IEEE80211_MLD_MAX_NUM_LINKS to avoid a stack out-of-bounds write.

msrc
9 дней назад

wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration

debian
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: w ...

github
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration link_id is taken from the ML Reconfiguration element (control & 0x000f), so it can be 0..15. link_removal_timeout[] has IEEE80211_MLD_MAX_NUM_LINKS (15) elements, so index 15 is out-of-bounds. Skip subelements with link_id >= IEEE80211_MLD_MAX_NUM_LINKS to avoid a stack out-of-bounds write.

EPSS

Процентиль: 6%
0.00024
Низкий

5.9 Medium

CVSS3