Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't WARN for connections on invalid channels It's not clear (to me) how exactly syzbot managed to hit this, but it seems conceivable that e.g. regulatory changed and has disabled a channel between scanning (channel is checked to be usable by cfg80211_get_ies_channel_number) and connecting on the channel later. With one scenario that isn't covered elsewhere described above, the warning isn't good, replace it with a (more informative) error message.

PUBLISHED Reserved 2026-02-14 | Published 2026-02-18 | Updated 2026-02-20 | Assigner Linux

Product status

Default status
unaffected

f2d9d270c15ae0139b54a7e7466d738327e97e03 (git) before 10d3ff7e5812c8d70300f6fa8f524009a06aa7e1
affected

f2d9d270c15ae0139b54a7e7466d738327e97e03 (git) before 99067b58a408a384d2a45c105eb3dce980a862ce
affected

Default status
affected

3.8
affected

Any version before 3.8
unaffected

6.18.10 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/10d3ff7e5812c8d70300f6fa8f524009a06aa7e1

git.kernel.org/...c/99067b58a408a384d2a45c105eb3dce980a862ce

cve.org (CVE-2025-71227)

nvd.nist.gov (CVE-2025-71227)

Download JSON