Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2421 articles · 130505 vulns · 35/41 feeds (7d)
← Back to list
7.8
CVE-2026-31548PATCHED
Linux · Linux

wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down When the nl80211 socket that originated a PMSR request is closed, cfg80211_release_pmsr() sets the request's nl_portid to zero and schedules pmsr_free_wk to process the abort asynchronously. If the interface is concurrently torn down before that work runs, cfg80211_pmsr_wdev_down() calls cfg80211_pmsr_process_abort() directly. However, the already- scheduled pmsr_free_wk work item remains pending and may run after the interface has been removed from the driver. This could cause the driver's abort_pmsr callback to operate on a torn-down interface, leading to undefined behavior and potential crashes. Cancel pmsr_free_wk synchronously in cfg80211_pmsr_wdev_down() before calling cfg80211_pmsr_process_abort(). This ensures any pending or in-progress work is drained before interface teardown proceeds, preventing the work from invoking the driver abort callback after the interface is gone.

Affected Products

VendorProductVersions
LinuxLinux9bb7e0f24e7e7d00daa1219b14539e2e602649b2, 9bb7e0f24e7e7d00daa1219b14539e2e602649b2, 9bb7e0f24e7e7d00daa1219b14539e2e602649b2, 9bb7e0f24e7e7d00daa1219b14539e2e602649b2, 9bb7e0f24e7e7d00daa1219b14539e2e602649b2, 9bb7e0f24e7e7d00daa1219b14539e2e602649b2, 5.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%

References

  • https://git.kernel.org/stable/c/28d3551f8d8cb3aec7497894d94150fe84d20e5e
  • https://git.kernel.org/stable/c/37e776e2e0a523731e2470dce6d563f0e8632a40
  • https://git.kernel.org/stable/c/d32c07ef1880fe20cf4ab223dbfedc9c0b2816aa
  • https://git.kernel.org/stable/c/a1b7a843f12a0c3e9d3a2ca607ce451916ef42cf
  • https://git.kernel.org/stable/c/72b7ea786b8e570ae11149e9089859a4a8634a13
  • https://git.kernel.org/stable/c/6dccbc9f3e1d38565dff7730d2b7d1e8b16c9b09

Related News (3 articles)

Tier A
Microsoft MSRC17h ago
CVE-2026-31548 wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down
→ No new info (linked only)
Tier C
VulDB5d ago
CVE-2026-31548 | Linux Kernel up to 6.19.9 cfg80211_release_pmsr denial of service
→ No new info (linked only)
Tier C
Linux Kernel CVEs5d ago
CVE-2026-31548: wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down
→ No new info (linked only)
CVSS 3.17.8 HIGH
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
28d3551f8d8cb3aec7497894d94150fe84d20e5e37e776e2e0a523731e2470dce6d563f0e8632a40d32c07ef1880fe20cf4ab223dbfedc9c0b2816aaa1b7a843f12a0c3e9d3a2ca607ce451916ef42cf72b7ea786b8e570ae11149e9089859a4a8634a136dccbc9f3e1d38565dff7730d2b7d1e8b16c9b0906.1.1676.6.1306.12.786.18.206.19.107.0
PublishedApr 24, 2026
Last enriched5d agov2
Trending Score40
Source articles3
Independent3
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-31431EXP
crypto: algif_aead - Revert to operating out-of-place
Trending: 84
CRITICALCVE-2026-31549EXP
i2c: cp2615: fix serial string NULL-deref at probe
Trending: 59
CRITICALCVE-2026-31661EXP
wifi: brcmsmac: Fix dma_free_coherent() size
Trending: 59
CRITICALCVE-2026-31689
EDAC/mc: Fix error path ordering in edac_mc_alloc()
Trending: 46
HIGHCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 43

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 24, 2026
Discovered by ZDM
Apr 24, 2026
Updated: affectedVersions
Apr 24, 2026
Patch Available
Apr 27, 2026

Version History

v2
Last enriched 5d ago
v2Tier C5d ago

Updated severity to CRITICAL, added new affected versions, and noted that no exploit is available.

affectedVersions
via VulDB
v15d ago

Initial creation