Improper Handling of Missing Special Element Affecting libperf-devel package, versions *


Severity

Recommended
0.0
low
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-LIBPERFDEVEL-15582890
  • published15 Mar 2026
  • disclosed14 Feb 2026

Introduced: 14 Feb 2026

CVE-2025-71224  (opens in a new tab)
CWE-166  (opens in a new tab)

How to fix?

There is no fixed version for Centos:9 libperf-devel.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libperf-devel package and not the libperf-devel package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: ocb: skip rx_no_sta when interface is not joined

ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB.

RX may run before JOIN_OCB is executed, in which case the OCB interface is not operational. Skip RX peer handling when the interface is not joined to avoid warnings in the RX path.

CVSS Base Scores

version 3.1