Acknowledged
Created: Aug 24, 2025
Updated: Aug 26, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]wifi: mac80211: reject TDLS operations when station is not associated[EOL][EOL]syzbot triggered a WARN in ieee80211_tdls_oper() by sending[EOL]NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,[EOL]before association completed and without prior TDLS setup.[EOL][EOL]This left internal state like sdata->u.mgd.tdls_peer uninitialized,[EOL]leading to a WARN_ON() in code paths that assumed it was valid.[EOL][EOL]Reject the operation early if not in station mode or not associated.
CREATE(Triage):(User=pbi-cn) [CVE-2025-38644 (https://nvd.nist.gov/vuln/detail/CVE-2025-38644)