CVE-2025-71224
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB.
RX may run before JOIN_OCB is executed, in which case the OCB interface is not operational. Skip RX peer handling when the interface is not joined to avoid warnings in the RX path.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's mac80211 OCB implementation, a missing interface-joined check can cause a warning when RX runs before JOIN_OCB.
Vulnerability
Description
The vulnerability resides in the Linux kernel's mac80211 subsystem, specifically in the OCB (Outside the Context of a BSS) mode for wireless interfaces. The function ieee80211_ocb_rx_no_sta() assumes a valid channel context is always present, but that context is only established after a JOIN_OCB command has been executed. If an RX packet arrives before the interface has joined an OCB channel, the function can trigger a kernel warning or potentially other undefined behavior due to the missing context [1].
Exploitation
Conditions
An attacker within radio range of a system with an OCB-capable wireless interface could trigger this vulnerability by sending a frame to the interface before the system has joined an OCB channel. This requires no authentication or special access; the frame simply needs to arrive during the brief window between interface initialization and the JOIN_OCB operation. In practice, this window is small but can be reliably triggered by a local attacker [1][2].
Impact
Successful exploitation could lead to a kernel warning in ieee80211_ocb_rx_no_sta() that may degrade system performance or, in some configurations, lead to a denial of service due to repeated warning printk calls. The impact is limited to a warning and does not appear to allow code execution or privilege escalation [1].
Mitigation
The fix, which introduces a check to skip RX peer handling when the interface handling when not joined, has been applied in the kernel stable tree as commit 8fd1c63e01 and is part of subsequent stable releases. Systems applying the latest updates are protected. No workaround is available; applying the kernel patch is the recommended action [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/536447521b3b9be1975c7f1db9054bdf2ab779cbnvd
- git.kernel.org/stable/c/8fd1c63e016893b7f6c1cf799410da4eaa98c090nvd
- git.kernel.org/stable/c/b04c75366a5471ae2dd7f4c33b7f1e2c08b9b32dnvd
- git.kernel.org/stable/c/e0bd226804f8e0098711042c93d64f3b720b36c0nvd
- git.kernel.org/stable/c/fcc768760df08337525cde28e8460e36f9855af8nvd
- git.kernel.org/stable/c/ff4071c60018a668249dc6a2df7d16330543540envd
- git.kernel.org/stable/c/ffe1e19c3b0e5b9eb9e04fad4bce7d1dc407fd77nvd
News mentions
0No linked articles in our index yet.