-
CVE-2025-39891
- EPSS 0.03%
- Published 01.10.2025 08:15:31
- Last modified 02.10.2025 19:12:17
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Initialize the chan_stats array to zero The adapter->chan_stats[] array is initialized in mwifiex_init_channel_scan_gap() with vmalloc(), which doesn't zero out memory. The array is filled in mwifiex_update_chan_statistics() and then the user can query the data in mwifiex_cfg80211_dump_survey(). There are two potential issues here. What if the user calls mwifiex_cfg80211_dump_survey() before the data has been filled in. Also the mwifiex_update_chan_statistics() function doesn't necessarily initialize the whole array. Since the array was not initialized at the start that could result in an information leak. Also this array is pretty small. It's a maximum of 900 bytes so it's more appropriate to use kcalloc() instead vmalloc().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
9eb0118b3470b4d2e4e3bbb1fc088b30c0285d65
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
Version <
05daef0442d28350a1a0d6d0e2cab4a7a91df475
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
Version <
acdf26a912190fc6746e2a890d7d0338190527b4
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
Version <
32c124c9c03aa755cbaf60ef7f76afd918d47659
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
Version <
9df29aa5637d94d24f7c5f054ef4feaa7b766111
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
Version <
06616410a3e5e6cd1de5b7cbc668f1a7edeedad9
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
Version <
5285b7009dc1e09d5bb9e05fae82e1a807882dbc
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
Version <
0e20450829ca3c1dbc2db536391537c57a40fe0b
Version
bf35443314acb43fa8a3f9f8046e14cbe178762b
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.19
Status
affected
Version <
3.19
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.299
Status
unaffected
Version <=
5.10.*
Version
5.10.243
Status
unaffected
Version <=
5.15.*
Version
5.15.192
Status
unaffected
Version <=
6.1.*
Version
6.1.151
Status
unaffected
Version <=
6.6.*
Version
6.6.105
Status
unaffected
Version <=
6.12.*
Version
6.12.46
Status
unaffected
Version <=
6.16.*
Version
6.16.6
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.081 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|