Количество 55
Количество 55
CVE-2025-38644
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.
CVE-2025-38644
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.
CVE-2025-38644
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.
CVE-2025-38644
wifi: mac80211: reject TDLS operations when station is not associated
CVE-2025-38644
In the Linux kernel, the following vulnerability has been resolved: w ...
GHSA-fcrc-8j6j-jr4g
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.
SUSE-SU-2025:3720-1
Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4)
SUSE-SU-2025:3703-1
Security update for the Linux Kernel (Live Patch 71 for SLE 12 SP5)
SUSE-SU-2025:03662-1
Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)
SUSE-SU-2025:3740-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)
SUSE-SU-2025:3683-1
Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)
SUSE-SU-2025:03672-1
Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)
SUSE-SU-2025:03666-1
Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3)
SUSE-SU-2025:03664-1
Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)
SUSE-SU-2025:03656-1
Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)
SUSE-SU-2025:03653-1
Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5)
SUSE-SU-2025:03652-1
Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)
SUSE-SU-2025:3736-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)
SUSE-SU-2025:3733-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5)
SUSE-SU-2025:3731-1
Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-38644 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated. | 0% Низкий | 2 месяца назад | ||
CVE-2025-38644 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated. | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-38644 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated. | 0% Низкий | 2 месяца назад | ||
CVE-2025-38644 wifi: mac80211: reject TDLS operations when station is not associated | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-38644 In the Linux kernel, the following vulnerability has been resolved: w ... | 0% Низкий | 2 месяца назад | ||
GHSA-fcrc-8j6j-jr4g In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated. | 0% Низкий | 2 месяца назад | ||
SUSE-SU-2025:3720-1 Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4) | 14 дней назад | |||
SUSE-SU-2025:3703-1 Security update for the Linux Kernel (Live Patch 71 for SLE 12 SP5) | 15 дней назад | |||
SUSE-SU-2025:03662-1 Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5) | 17 дней назад | |||
SUSE-SU-2025:3740-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5) | 13 дней назад | |||
SUSE-SU-2025:3683-1 Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | 16 дней назад | |||
SUSE-SU-2025:03672-1 Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3) | 16 дней назад | |||
SUSE-SU-2025:03666-1 Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3) | 17 дней назад | |||
SUSE-SU-2025:03664-1 Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) | 17 дней назад | |||
SUSE-SU-2025:03656-1 Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5) | 17 дней назад | |||
SUSE-SU-2025:03653-1 Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) | 18 дней назад | |||
SUSE-SU-2025:03652-1 Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 18 дней назад | |||
SUSE-SU-2025:3736-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5) | 14 дней назад | |||
SUSE-SU-2025:3733-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP5) | 14 дней назад | |||
SUSE-SU-2025:3731-1 Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) | 14 дней назад |
Уязвимостей на страницу