CVE-2025-71224
📋 TL;DR
This CVE addresses a race condition in the Linux kernel's OCB (Outside the Context of a BSS) WiFi mode implementation where the ieee80211_ocb_rx_no_sta() function could be called before the interface is properly joined. This affects Linux systems using OCB mode for WiFi communications, potentially causing kernel warnings or instability.
💻 Affected Systems
- Linux kernel
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash leading to denial of service on affected systems using OCB WiFi mode.
Likely Case
Kernel warning messages in system logs and potential packet loss or connectivity issues for OCB WiFi interfaces.
If Mitigated
Minor performance impact or warning messages that don't affect system stability.
🎯 Exploit Status
Requires ability to configure OCB WiFi mode and trigger the race condition between RX processing and JOIN_OCB operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees (commits referenced in CVE)
Vendor Advisory: https://git.kernel.org/stable/c/536447521b3b9be1975c7f1db9054bdf2ab779cb
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Check with your distribution vendor for specific patched kernel versions. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable OCB WiFi mode
linuxDisable OCB (Outside the Context of a BSS) mode if not required for your use case
# Check if OCB is enabled
iw list | grep -i ocb
# Disable OCB mode configuration
🧯 If You Can't Patch
- Disable OCB WiFi mode entirely if not needed
- Monitor system logs for kernel warnings related to OCB or mac80211
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if OCB mode is enabled: 'uname -r' and 'iw list | grep -i ocb'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version contains the fix commits or check that OCB mode warnings no longer appear in system logs
📡 Detection & Monitoring
Log Indicators:
- Kernel warnings mentioning 'ieee80211_ocb_rx_no_sta'
- mac80211 or OCB related warnings in dmesg
Network Indicators:
- Unusual WiFi connectivity issues on OCB interfaces
SIEM Query:
source="kernel" AND ("ieee80211_ocb_rx_no_sta" OR "mac80211" OR "OCB")
🔗 References
- https://git.kernel.org/stable/c/536447521b3b9be1975c7f1db9054bdf2ab779cb
- https://git.kernel.org/stable/c/8fd1c63e016893b7f6c1cf799410da4eaa98c090
- https://git.kernel.org/stable/c/b04c75366a5471ae2dd7f4c33b7f1e2c08b9b32d
- https://git.kernel.org/stable/c/e0bd226804f8e0098711042c93d64f3b720b36c0
- https://git.kernel.org/stable/c/fcc768760df08337525cde28e8460e36f9855af8
- https://git.kernel.org/stable/c/ff4071c60018a668249dc6a2df7d16330543540e
- https://git.kernel.org/stable/c/ffe1e19c3b0e5b9eb9e04fad4bce7d1dc407fd77