{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38644","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.030Z","datePublished":"2025-08-22T16:00:49.899Z","dateUpdated":"2026-05-11T21:32:12.399Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:32:12.399Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: reject TDLS operations when station is not associated\n\nsyzbot triggered a WARN in ieee80211_tdls_oper() by sending\nNL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,\nbefore association completed and without prior TDLS setup.\n\nThis left internal state like sdata->u.mgd.tdls_peer uninitialized,\nleading to a WARN_ON() in code paths that assumed it was valid.\n\nReject the operation early if not in station mode or not associated."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/mac80211/tdls.c"],"versions":[{"version":"81dd2b8822410e56048b927be779d95a2b6dc186","lessThan":"0c84204cf0bbe89e454a5caccc6a908bc7db1542","status":"affected","versionType":"git"},{"version":"81dd2b8822410e56048b927be779d95a2b6dc186","lessThan":"378ae9ccaea3f445838a087962a067b5cb2e8577","status":"affected","versionType":"git"},{"version":"81dd2b8822410e56048b927be779d95a2b6dc186","lessThan":"af72badd5ee423eb16f6ad7fe0a62f1b4252d848","status":"affected","versionType":"git"},{"version":"81dd2b8822410e56048b927be779d95a2b6dc186","lessThan":"4df663d4c1ca386dcab2f743dfc9f0cc07aef73c","status":"affected","versionType":"git"},{"version":"81dd2b8822410e56048b927be779d95a2b6dc186","lessThan":"31af06b574394530f68a4310c45ecbe2f68853c4","status":"affected","versionType":"git"},{"version":"81dd2b8822410e56048b927be779d95a2b6dc186","lessThan":"16ecdab5446f15a61ec88eb0d23d25d009821db0","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/mac80211/tdls.c"],"versions":[{"version":"3.17","status":"affected"},{"version":"0","lessThan":"3.17","status":"unaffected","versionType":"semver"},{"version":"6.1.148","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.102","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.42","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.10","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16.1","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.17","versionEndExcluding":"6.1.148"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.17","versionEndExcluding":"6.6.102"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.17","versionEndExcluding":"6.12.42"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.17","versionEndExcluding":"6.15.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.17","versionEndExcluding":"6.16.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.17","versionEndExcluding":"6.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/0c84204cf0bbe89e454a5caccc6a908bc7db1542"},{"url":"https://git.kernel.org/stable/c/378ae9ccaea3f445838a087962a067b5cb2e8577"},{"url":"https://git.kernel.org/stable/c/af72badd5ee423eb16f6ad7fe0a62f1b4252d848"},{"url":"https://git.kernel.org/stable/c/4df663d4c1ca386dcab2f743dfc9f0cc07aef73c"},{"url":"https://git.kernel.org/stable/c/31af06b574394530f68a4310c45ecbe2f68853c4"},{"url":"https://git.kernel.org/stable/c/16ecdab5446f15a61ec88eb0d23d25d009821db0"}],"title":"wifi: mac80211: reject TDLS operations when station is not associated","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:40:40.962Z"}}]}}