Логотип exploitDog
bind: "CVE-2025-38644"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-38644"

Количество 60

Количество 60

ubuntu логотип

CVE-2025-38644

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2025-38644

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-38644

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2025-38644

7 месяцев назад

wifi: mac80211: reject TDLS operations when station is not associated

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-38644

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-fcrc-8j6j-jr4g

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-15779

9 месяцев назад

Уязвимость компонента net/mac80211/tdls.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7
EPSS: Низкий
redos логотип

ROS-20260324-73-0036

3 дня назад

Уязвимость kernel-lt

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3720-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3703-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 71 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03662-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3740-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3683-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03672-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03666-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03664-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03656-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03653-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03652-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3736-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38644

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-38644

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-38644

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
0%
Низкий
7 месяцев назад
msrc логотип
CVE-2025-38644

wifi: mac80211: reject TDLS operations when station is not associated

CVSS3: 5.5
0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-38644

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 5.5
0%
Низкий
7 месяцев назад
github логотип
GHSA-fcrc-8j6j-jr4g

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject TDLS operations when station is not associated syzbot triggered a WARN in ieee80211_tdls_oper() by sending NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT, before association completed and without prior TDLS setup. This left internal state like sdata->u.mgd.tdls_peer uninitialized, leading to a WARN_ON() in code paths that assumed it was valid. Reject the operation early if not in station mode or not associated.

CVSS3: 5.5
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-15779

Уязвимость компонента net/mac80211/tdls.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7
0%
Низкий
9 месяцев назад
redos логотип
ROS-20260324-73-0036

Уязвимость kernel-lt

CVSS3: 7
0%
Низкий
3 дня назад
suse-cvrf логотип
SUSE-SU-2025:3720-1

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP4)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3703-1

Security update for the Linux Kernel (Live Patch 71 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03662-1

Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3740-1

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3683-1

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03672-1

Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03666-1

Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03664-1

Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03656-1

Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03653-1

Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03652-1

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3736-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5)

5 месяцев назад

Уязвимостей на страницу