In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: always free skb on ieee80211txprepare_skb() failure
ieee80211txprepareskb() has three error paths, but only two of them free the skb. The first error path (ieee80211txprepare() returning TXDROP) does not free it, while invoketxhandlers() failure and the fragmentation check both do.
Add kfreeskb() to the first error path so all three are consistent, and remove the now-redundant frees in callers (ath9k, mt76, mac80211hwsim) to avoid double-free.
Document the skb ownership guarantee in the function's kdoc.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23444.json",
"cna_assigner": "Linux"
}