CVE-2026-43052

high

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check tdls flag in ieee80211_tdls_oper When NL80211_TDLS_ENABLE_LINK is called, the code only checks if the station exists but not whether it is actually a TDLS station. This allows the operation to proceed for non-TDLS stations, causing unintended side effects like modifying channel context and HT protection before failing. Add a check for sta->sta.tdls early in the ENABLE_LINK case, before any side effects occur, to ensure the operation is only allowed for actual TDLS peers.

References

https://git.kernel.org/stable/c/e77b2937aaa20264e4bd699d3244bdb50e7e3343

https://git.kernel.org/stable/c/be81f17151fcb8546a95f35ca8f4231b065985de

https://git.kernel.org/stable/c/8148c2fda4ebb17104a573649c9b699208ad10ee

https://git.kernel.org/stable/c/7d73872d949c488a1d7c308031d6a9d89b5e0a8b

Details

Source: Mitre, NVD

Published: 2026-05-01

Updated: 2026-05-01

Risk Information

CVSS v2

Base Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018