In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB. RX may run before JOIN_OCB is executed, in which case the OCB interface is not operational. Skip RX peer handling when the interface is not joined to avoid warnings in the RX path.
https://git.kernel.org/stable/c/ffe1e19c3b0e5b9eb9e04fad4bce7d1dc407fd77
https://git.kernel.org/stable/c/ff4071c60018a668249dc6a2df7d16330543540e
https://git.kernel.org/stable/c/fcc768760df08337525cde28e8460e36f9855af8
https://git.kernel.org/stable/c/e0bd226804f8e0098711042c93d64f3b720b36c0
https://git.kernel.org/stable/c/b04c75366a5471ae2dd7f4c33b7f1e2c08b9b32d
https://git.kernel.org/stable/c/8fd1c63e016893b7f6c1cf799410da4eaa98c090
https://git.kernel.org/stable/c/536447521b3b9be1975c7f1db9054bdf2ab779cb