In the Linux kernel, the following vulnerability has been resolved:
wifi: mwifiex: Initialize the chan_stats array to zero
The adapter->chan_stats[] array is initialized in
mwifiex_init_channel_scan_gap() with vmalloc(), which doesn't zero out
memory. The array is filled in mwifiex_update_chan_statistics()
and then the user can query the data in mwifiex_cfg80211_dump_survey().
There are two potential issues here. What if the user calls
mwifiex_cfg80211_dump_survey() before the data has been filled in.
Also the mwifiex_update_chan_statistics() function doesn't necessarily
initialize the whole array. Since the array was not initialized at
the start that could result in an information leak.
Also this array is pretty small. It's a maximum of 900 bytes so it's
more appropriate to use kcalloc() instead vmalloc().
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Jan 2026, 02:32
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| CWE | NVD-CWE-Other | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/05daef0442d28350a1a0d6d0e2cab4a7a91df475 - Patch | |
| References | () https://git.kernel.org/stable/c/06616410a3e5e6cd1de5b7cbc668f1a7edeedad9 - Patch | |
| References | () https://git.kernel.org/stable/c/0e20450829ca3c1dbc2db536391537c57a40fe0b - Patch | |
| References | () https://git.kernel.org/stable/c/32c124c9c03aa755cbaf60ef7f76afd918d47659 - Patch | |
| References | () https://git.kernel.org/stable/c/5285b7009dc1e09d5bb9e05fae82e1a807882dbc - Patch | |
| References | () https://git.kernel.org/stable/c/9df29aa5637d94d24f7c5f054ef4feaa7b766111 - Patch | |
| References | () https://git.kernel.org/stable/c/9eb0118b3470b4d2e4e3bbb1fc088b30c0285d65 - Patch | |
| References | () https://git.kernel.org/stable/c/acdf26a912190fc6746e2a890d7d0338190527b4 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 Oct 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 08:15
Updated : 2026-01-23 02:32
NVD link : CVE-2025-39891
Mitre link : CVE-2025-39891
CVE.ORG link : CVE-2025-39891
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
