The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23444

CVE-2026-23444: Linux Kernel Use-After-Free Vulnerability

CVE-2026-23444 is a use-after-free vulnerability in the Linux kernel's mac80211 wifi component that causes memory corruption. This article covers technical details, affected versions, impact, and mitigation steps.

Published: April 10, 2026

CVE-2026-23444 Overview

A memory management vulnerability has been identified in the Linux kernel's mac80211 WiFi subsystem. The ieee80211_tx_prepare_skb() function contains inconsistent error handling across its three error paths, with only two of them properly freeing the socket buffer (skb). This inconsistency can lead to memory leaks during WiFi transmission failures and potential double-free conditions in affected WiFi drivers.

Critical Impact

This vulnerability affects Linux kernel systems using the mac80211 WiFi stack, potentially causing memory leaks and system instability. Affected drivers include ath9k, mt76, and mac80211_hwsim.

Affected Products

  • Linux kernel mac80211 WiFi subsystem
  • Systems using ath9k WiFi driver
  • Systems using mt76 WiFi driver
  • Systems using mac80211_hwsim driver

Discovery Timeline

  • 2026-04-03 - CVE CVE-2026-23444 published to NVD
  • 2026-04-07 - Last updated in NVD database

Technical Details for CVE-2026-23444

Vulnerability Analysis

The vulnerability exists within the ieee80211_tx_prepare_skb() function in the Linux kernel's mac80211 WiFi implementation. This function is responsible for preparing socket buffers (skbs) for transmission over WiFi interfaces. The function has three distinct error paths that can be triggered during transmission preparation:

  1. When ieee80211_tx_prepare() returns TX_DROP
  2. When invoke_tx_handlers() fails
  3. When the fragmentation check fails

The core issue is that the first error path (when ieee80211_tx_prepare() returns TX_DROP) does not free the skb, while the other two error paths properly call kfree_skb() to release the buffer. This inconsistency creates a memory leak when the first error condition is triggered.

Additionally, WiFi drivers that call ieee80211_tx_prepare_skb() (including ath9k, mt76, and mac80211_hwsim) attempted to compensate for this inconsistency by implementing their own skb freeing logic. However, this approach can lead to double-free conditions when the function's error paths do free the skb properly.

Root Cause

The root cause is inconsistent memory management in the ieee80211_tx_prepare_skb() function's error handling. The function lacks a clear ownership contract for the skb across all error paths, leading to ambiguous behavior where some paths free the buffer and others do not. This violates the principle of consistent resource cleanup and creates confusion for callers about when they need to free the skb themselves.

Attack Vector

This vulnerability is primarily a reliability and stability issue rather than a direct security exploit vector. An attacker with local access or the ability to trigger WiFi transmission errors could potentially:

  • Cause memory exhaustion through repeated triggering of the memory leak condition
  • Destabilize the system by triggering double-free conditions through driver interactions
  • Potentially exploit the memory corruption caused by double-free for privilege escalation

The vulnerability requires the ability to influence WiFi transmission behavior, which may be achievable through malformed wireless frames or by manipulating network conditions that trigger the specific error paths.

Detection Methods for CVE-2026-23444

Indicators of Compromise

  • Unexplained memory consumption increases on systems with active WiFi interfaces
  • Kernel log messages indicating memory allocation failures in the mac80211 subsystem
  • System instability or crashes related to WiFi driver operations
  • Double-free warnings or kernel panics in slab allocator logs

Detection Strategies

  • Monitor kernel logs for mac80211-related error messages and memory warnings
  • Track system memory usage for unexplained growth patterns on WiFi-enabled systems
  • Use kernel memory debugging tools (KASAN, KMEMLEAK) to detect memory leaks and double-frees
  • Review dmesg output for slab corruption or use-after-free warnings in network-related subsystems

Monitoring Recommendations

  • Enable kernel memory debugging options in development and testing environments
  • Deploy monitoring for kernel panic events and memory exhaustion conditions
  • Track WiFi subsystem health metrics including transmission error rates
  • Implement alerting for unusual memory consumption patterns on affected systems

How to Mitigate CVE-2026-23444

Immediate Actions Required

  • Update the Linux kernel to a patched version that includes the fix for this vulnerability
  • Review and update WiFi drivers (ath9k, mt76, mac80211_hwsim) to remove redundant skb freeing
  • Consider disabling WiFi on critical systems until patches can be applied if experiencing stability issues
  • Monitor affected systems for signs of memory exhaustion or instability

Patch Information

The fix has been merged into the Linux kernel stable branches. The patch adds kfree_skb() to the first error path in ieee80211_tx_prepare_skb() to ensure consistent cleanup across all three error paths. Additionally, the patch removes the now-redundant free operations in the caller drivers (ath9k, mt76, mac80211_hwsim) to prevent double-free conditions.

The patch also updates the function's kernel documentation (kdoc) to clearly document the skb ownership guarantee, making the API contract explicit for future driver developers.

Relevant kernel commits can be found at:

  • Kernel.org Commit 06e769d
  • Kernel.org Commit 50f1b69
  • Kernel.org Commit d5ad6ab

Workarounds

  • If immediate patching is not possible, consider temporarily switching to wired network connections on critical systems
  • Reduce WiFi transmission activity where possible to minimize exposure to the vulnerable code paths
  • Enable kernel memory debugging to detect and respond to memory issues more quickly
  • Implement system monitoring and automatic restart procedures for systems experiencing memory exhaustion

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel.org Commit Update

  • Kernel.org Commit Update

  • Kernel.org Commit Update
  • Related CVEs
  • CVE-2026-43328: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43500: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43333: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43335: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English