CVE-2025-71224

high

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB. RX may run before JOIN_OCB is executed, in which case the OCB interface is not operational. Skip RX peer handling when the interface is not joined to avoid warnings in the RX path.

References

https://git.kernel.org/stable/c/ffe1e19c3b0e5b9eb9e04fad4bce7d1dc407fd77

https://git.kernel.org/stable/c/ff4071c60018a668249dc6a2df7d16330543540e

https://git.kernel.org/stable/c/fcc768760df08337525cde28e8460e36f9855af8

https://git.kernel.org/stable/c/e0bd226804f8e0098711042c93d64f3b720b36c0

https://git.kernel.org/stable/c/b04c75366a5471ae2dd7f4c33b7f1e2c08b9b32d

https://git.kernel.org/stable/c/8fd1c63e016893b7f6c1cf799410da4eaa98c090

https://git.kernel.org/stable/c/536447521b3b9be1975c7f1db9054bdf2ab779cb

Details

Source: Mitre, NVD

Published: 2026-02-14

Updated: 2026-02-14

Risk Information

CVSS v2

Base Score: 6.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High