PT-2026-30177 · Linux · Linux
Published
2026-04-03
·
Updated
2026-04-03
·
CVE-2026-31394
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
mac80211: fix crash in ieee80211 chan bw change for AP VLAN stations
ieee80211 chan bw change() iterates all stations and accesses
link->reserved.oper via sta->sdata->link[link id]. For stations on
AP VLAN interfaces (e.g. 4addr WDS clients), sta->sdata points to
the VLAN sdata, whose link never participates in chanctx reservations.
This leaves link->reserved.oper zero-initialized with chan == NULL,
causing a NULL pointer dereference in ieee80211 sta cap rx bw()
when accessing chandef->chan->band during CSA.
Resolve the VLAN sdata to its parent AP sdata using get bss sdata()
before accessing link data.
[also change sta->sdata in ARRAY SIZE even if it doesn't matter]
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux