CVE-2025-38644
Linux Kernel wifi mac80211 Uninitialized State Vulnerability
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.
INFO
Published Date :
Aug. 22, 2025, 4:15 p.m.
Last Modified :
Aug. 22, 2025, 6:08 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-38644
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-38644
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-38644
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-38644
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-38644
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Aug. 22, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated. Added Reference https://git.kernel.org/stable/c/0c84204cf0bbe89e454a5caccc6a908bc7db1542 Added Reference https://git.kernel.org/stable/c/16ecdab5446f15a61ec88eb0d23d25d009821db0 Added Reference https://git.kernel.org/stable/c/31af06b574394530f68a4310c45ecbe2f68853c4 Added Reference https://git.kernel.org/stable/c/378ae9ccaea3f445838a087962a067b5cb2e8577 Added Reference https://git.kernel.org/stable/c/4df663d4c1ca386dcab2f743dfc9f0cc07aef73c Added Reference https://git.kernel.org/stable/c/af72badd5ee423eb16f6ad7fe0a62f1b4252d848