Description
In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations

ieee80211_chan_bw_change() iterates all stations and accesses
link->reserved.oper via sta->sdata->link[link_id]. For stations on
AP_VLAN interfaces (e.g. 4addr WDS clients), sta->sdata points to
the VLAN sdata, whose link never participates in chanctx reservations.
This leaves link->reserved.oper zero-initialized with chan == NULL,
causing a NULL pointer dereference in __ieee80211_sta_cap_rx_bw()
when accessing chandef->chan->band during CSA.

Resolve the VLAN sdata to its parent AP sdata using get_bss_sdata()
before accessing link data.

[also change sta->sdata in ARRAY_SIZE even if it doesn't matter]
Published: 2026-04-03
Score: 7.0 High
EPSS: n/a
KEV: No
Impact: Kernel Crash (Denial of Service)
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the mac80211 subsystem of the Linux kernel, where the ieee80211_chan_bw_change() routine accesses station link data that is uninitialized for AP_VLAN stations. This leads to a NULL pointer dereference when a channel switch announcement is processed, causing the kernel to panic. The result is a denial of service that can bring the entire system down. The weakness is a classic NULL pointer dereference scenario found in kernel code that handles wireless channel width changes.

Affected Systems

All installations of the Linux kernel that include the mac80211 module prior to the commit that implements the fix are affected. The issue specifically impacts configurations that use AP_VLAN interfaces (4‑address WDS clients). No precise kernel version range is supplied, so any kernel build before the patch should be considered vulnerable.

Risk and Exploitability

CVSS and EPSS scores are not provided, and the vulnerability is not listed in the CISA KEV catalog, so public exploitation data is limited. It is inferred that an attacker could trigger the crash by inducing a channel width change on an AP_VLAN station, likely via a crafted network frame sent over Wi‑Fi. Because the flaw leads to a kernel panic, the risk is significant, and the vulnerability presents a remote denial‑of‑service threat to affected hosts.

Generated by OpenCVE AI on April 3, 2026 at 19:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains the mac80211 patch (identified by commit 3c6629e859a2211a1fbb4868f915413f80001ca5).
  • If an immediate kernel upgrade is not feasible, disable or remove AP_VLAN (4‑address WDS) interfaces from the system.
  • Check your distribution’s security advisories for a patched kernel release and apply it promptly.
  • Monitor system logs for kernel panics or crash dumps after Wi‑Fi channel changes and investigate any anomalous behavior.

Generated by OpenCVE AI on April 3, 2026 at 19:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations ieee80211_chan_bw_change() iterates all stations and accesses link->reserved.oper via sta->sdata->link[link_id]. For stations on AP_VLAN interfaces (e.g. 4addr WDS clients), sta->sdata points to the VLAN sdata, whose link never participates in chanctx reservations. This leaves link->reserved.oper zero-initialized with chan == NULL, causing a NULL pointer dereference in __ieee80211_sta_cap_rx_bw() when accessing chandef->chan->band during CSA. Resolve the VLAN sdata to its parent AP sdata using get_bss_sdata() before accessing link data. [also change sta->sdata in ARRAY_SIZE even if it doesn't matter]
Title mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:58.806Z

Reserved: 2026-03-09T15:48:24.085Z

Link: CVE-2026-31394

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:37.597

Modified: 2026-04-03T16:16:37.597

Link: CVE-2026-31394

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-31394 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:32Z

Weaknesses