CVE-2025-71227

Source
https://cve.org/CVERecord?id=CVE-2025-71227
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71227.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71227
Downstream
Related
Published
2026-02-18T14:21:48.422Z
Modified
2026-04-02T13:04:58.058385Z
Summary
wifi: mac80211: don't WARN for connections on invalid channels
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't WARN for connections on invalid channels

It's not clear (to me) how exactly syzbot managed to hit this, but it seems conceivable that e.g. regulatory changed and has disabled a channel between scanning (channel is checked to be usable by cfg80211getieschannelnumber) and connecting on the channel later.

With one scenario that isn't covered elsewhere described above, the warning isn't good, replace it with a (more informative) error message.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71227.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f2d9d270c15ae0139b54a7e7466d738327e97e03
Fixed
10d3ff7e5812c8d70300f6fa8f524009a06aa7e1
Fixed
99067b58a408a384d2a45c105eb3dce980a862ce

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71227.json"