-

CVE-2025-39891

In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Initialize the chan_stats array to zero

The adapter->chan_stats[] array is initialized in
mwifiex_init_channel_scan_gap() with vmalloc(), which doesn't zero out
memory.  The array is filled in mwifiex_update_chan_statistics()
and then the user can query the data in mwifiex_cfg80211_dump_survey().

There are two potential issues here.  What if the user calls
mwifiex_cfg80211_dump_survey() before the data has been filled in.
Also the mwifiex_update_chan_statistics() function doesn't necessarily
initialize the whole array.  Since the array was not initialized at
the start that could result in an information leak.

Also this array is pretty small.  It's a maximum of 900 bytes so it's
more appropriate to use kcalloc() instead vmalloc().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 9eb0118b3470b4d2e4e3bbb1fc088b30c0285d65
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
Version < 05daef0442d28350a1a0d6d0e2cab4a7a91df475
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
Version < acdf26a912190fc6746e2a890d7d0338190527b4
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
Version < 32c124c9c03aa755cbaf60ef7f76afd918d47659
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
Version < 9df29aa5637d94d24f7c5f054ef4feaa7b766111
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
Version < 06616410a3e5e6cd1de5b7cbc668f1a7edeedad9
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
Version < 5285b7009dc1e09d5bb9e05fae82e1a807882dbc
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
Version < 0e20450829ca3c1dbc2db536391537c57a40fe0b
Version bf35443314acb43fa8a3f9f8046e14cbe178762b
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.19
Status affected
Version < 3.19
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.299
Status unaffected
Version <= 5.10.*
Version 5.10.243
Status unaffected
Version <= 5.15.*
Version 5.15.192
Status unaffected
Version <= 6.1.*
Version 6.1.151
Status unaffected
Version <= 6.6.*
Version 6.6.105
Status unaffected
Version <= 6.12.*
Version 6.12.46
Status unaffected
Version <= 6.16.*
Version 6.16.6
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string