CVE-2025-38644

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 16:21

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0c84204cf0bbe89e454a5caccc6a908bc7db1542 - () https://git.kernel.org/stable/c/0c84204cf0bbe89e454a5caccc6a908bc7db1542 - Patch
References () https://git.kernel.org/stable/c/16ecdab5446f15a61ec88eb0d23d25d009821db0 - () https://git.kernel.org/stable/c/16ecdab5446f15a61ec88eb0d23d25d009821db0 - Patch
References () https://git.kernel.org/stable/c/31af06b574394530f68a4310c45ecbe2f68853c4 - () https://git.kernel.org/stable/c/31af06b574394530f68a4310c45ecbe2f68853c4 - Patch
References () https://git.kernel.org/stable/c/378ae9ccaea3f445838a087962a067b5cb2e8577 - () https://git.kernel.org/stable/c/378ae9ccaea3f445838a087962a067b5cb2e8577 - Patch
References () https://git.kernel.org/stable/c/4df663d4c1ca386dcab2f743dfc9f0cc07aef73c - () https://git.kernel.org/stable/c/4df663d4c1ca386dcab2f743dfc9f0cc07aef73c - Patch
References () https://git.kernel.org/stable/c/af72badd5ee423eb16f6ad7fe0a62f1b4252d848 - () https://git.kernel.org/stable/c/af72badd5ee423eb16f6ad7fe0a62f1b4252d848 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE CWE-908
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: rechazar operaciones TDLS cuando la estación no está asociada. syzbot activó una advertencia en ieee80211_tdls_oper() al enviar NL80211_TDLS_ENABLE_LINK inmediatamente después de NL80211_CMD_CONNECT, antes de que se completara la asociación y sin haber configurado previamente TDLS. Esto dejó un estado interno como sdata->u.mgd.tdls_peer sin inicializar, lo que provocó una advertencia WARN_ON() en las rutas de código que asumían que era válido. Rechace la operación antes de tiempo si no está en modo estación o no está asociada.

22 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 16:15

Updated : 2026-01-07 16:21


NVD link : CVE-2025-38644

Mitre link : CVE-2025-38644

CVE.ORG link : CVE-2025-38644


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource