In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: reject TDLS operations when station is not associated
syzbot triggered a WARN in ieee80211tdlsoper() by sending NL80211TDLSENABLELINK immediately after NL80211CMD_CONNECT, before association completed and without prior TDLS setup.
This left internal state like sdata->u.mgd.tdlspeer uninitialized, leading to a WARNON() in code paths that assumed it was valid.
Reject the operation early if not in station mode or not associated.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4df663d4c1ca386dcab2f743dfc9f0cc07aef73c",
"target": {
"file": "net/mac80211/tdls.c",
"function": "ieee80211_tdls_oper"
},
"id": "CVE-2025-38644-2b5d5677",
"signature_type": "Function",
"digest": {
"function_hash": "338264754007851402613787907275461413696",
"length": 1610.0
},
"deprecated": false,
"signature_version": "v1"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4df663d4c1ca386dcab2f743dfc9f0cc07aef73c",
"target": {
"file": "net/mac80211/tdls.c"
},
"id": "CVE-2025-38644-eb0de22a",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"111601683448445532126503742654848054909",
"24289537945961244293587304920375222022",
"255899386410216570496559553746229296580",
"6584539328198504495868569541117106999"
]
},
"deprecated": false,
"signature_version": "v1"
}
]