VYPR
Unrated severityNVD Advisory· Published Feb 14, 2026· Updated Apr 15, 2026

CVE-2025-71224

CVE-2025-71224

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: ocb: skip rx_no_sta when interface is not joined

ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB.

RX may run before JOIN_OCB is executed, in which case the OCB interface is not operational. Skip RX peer handling when the interface is not joined to avoid warnings in the RX path.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's mac80211 OCB implementation, a missing interface-joined check can cause a warning when RX runs before JOIN_OCB.

Vulnerability

Description

The vulnerability resides in the Linux kernel's mac80211 subsystem, specifically in the OCB (Outside the Context of a BSS) mode for wireless interfaces. The function ieee80211_ocb_rx_no_sta() assumes a valid channel context is always present, but that context is only established after a JOIN_OCB command has been executed. If an RX packet arrives before the interface has joined an OCB channel, the function can trigger a kernel warning or potentially other undefined behavior due to the missing context [1].

Exploitation

Conditions

An attacker within radio range of a system with an OCB-capable wireless interface could trigger this vulnerability by sending a frame to the interface before the system has joined an OCB channel. This requires no authentication or special access; the frame simply needs to arrive during the brief window between interface initialization and the JOIN_OCB operation. In practice, this window is small but can be reliably triggered by a local attacker [1][2].

Impact

Successful exploitation could lead to a kernel warning in ieee80211_ocb_rx_no_sta() that may degrade system performance or, in some configurations, lead to a denial of service due to repeated warning printk calls. The impact is limited to a warning and does not appear to allow code execution or privilege escalation [1].

Mitigation

The fix, which introduces a check to skip RX peer handling when the interface handling when not joined, has been applied in the kernel stable tree as commit 8fd1c63e01 and is part of subsequent stable releases. Systems applying the latest updates are protected. No workaround is available; applying the kernel patch is the recommended action [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.