CVE-2025-38644

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38644
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38644.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38644
Downstream
Related
Published
2025-08-22T16:15:38Z
Modified
2025-09-06T13:01:27Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: reject TDLS operations when station is not associated

syzbot triggered a WARN in ieee80211tdlsoper() by sending NL80211TDLSENABLELINK immediately after NL80211CMD_CONNECT, before association completed and without prior TDLS setup.

This left internal state like sdata->u.mgd.tdlspeer uninitialized, leading to a WARNON() in code paths that assumed it was valid.

Reject the operation early if not in station mode or not associated.

References

Affected packages