CVE-2025-38644
📋 TL;DR
This CVE describes a vulnerability in the Linux kernel's WiFi subsystem where TDLS (Tunneled Direct Link Setup) operations could be triggered before a station is fully associated, causing uninitialized memory access. This affects Linux systems using the mac80211 WiFi stack. Attackers could potentially trigger kernel warnings or crashes, but exploitation requires local network access.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash leading to denial of service, potentially allowing further exploitation through memory corruption.
Likely Case
Kernel warning messages in system logs and potential denial of service for WiFi connectivity on affected systems.
If Mitigated
Kernel warning logged but system remains stable due to early rejection of invalid operations.
🎯 Exploit Status
Exploitation requires sending specific TDLS commands at precise timing during WiFi association process
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with commits: 0c84204cf0bbe89e454a5caccc6a908bc7db1542, 16ecdab5446f15a61ec88eb0d23d25d009821db0, 31af06b574394530f68a4310c45ecbe2f68853c4, 378ae9ccaea3f445838a087962a067b5cb2e8577, 4df663d4c1ca386dcab2f743dfc9f0cc07aef73c
Vendor Advisory: https://git.kernel.org/stable/c/0c84204cf0bbe89e454a5caccc6a908bc7db1542
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable TDLS functionality
LinuxPrevent TDLS operations by disabling the feature in WiFi configuration
echo 'options cfg80211 disable_tdls=1' > /etc/modprobe.d/disable-tdls.conf
modprobe -r cfg80211
modprobe cfg80211
🧯 If You Can't Patch
- Disable TDLS functionality in WiFi configuration
- Implement network segmentation to limit potential attackers
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if TDLS is enabled in WiFi configuration
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes one of the patch commits, check that TDLS operations are properly rejected before association
📡 Detection & Monitoring
Log Indicators:
- Kernel warnings containing 'WARNING: at net/mac80211/tdls.c' or similar
- System logs showing TDLS operations failing
Network Indicators:
- Unusual TDLS protocol packets during WiFi association phase
SIEM Query:
source="kernel" AND ("tdls" OR "ieee80211_tdls_oper") AND ("WARN" OR "warning")
🔗 References
- https://git.kernel.org/stable/c/0c84204cf0bbe89e454a5caccc6a908bc7db1542
- https://git.kernel.org/stable/c/16ecdab5446f15a61ec88eb0d23d25d009821db0
- https://git.kernel.org/stable/c/31af06b574394530f68a4310c45ecbe2f68853c4
- https://git.kernel.org/stable/c/378ae9ccaea3f445838a087962a067b5cb2e8577
- https://git.kernel.org/stable/c/4df663d4c1ca386dcab2f743dfc9f0cc07aef73c
- https://git.kernel.org/stable/c/af72badd5ee423eb16f6ad7fe0a62f1b4252d848
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html