CVE-2025-39891Sensitive Information Exposure in Linux

Severity
7.1HIGHNVD
EPSS
0.0%
top 97.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1
Latest updateApr 9

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Initialize the chan_stats array to zero The adapter->chan_stats[] array is initialized in mwifiex_init_channel_scan_gap() with vmalloc(), which doesn't zero out memory. The array is filled in mwifiex_update_chan_statistics() and then the user can query the data in mwifiex_cfg80211_dump_survey(). There are two potential issues here. What if the user calls mwifiex_cfg80211_dump_survey() before the data has been f

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

NVDlinux/linux_kernel3.195.4.299+7
Debianlinux/linux_kernel< 5.10.244-1+3
CVEListV5linux/linuxbf35443314acb43fa8a3f9f8046e14cbe178762b9eb0118b3470b4d2e4e3bbb1fc088b30c0285d65+8

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
CVEList
wifi: mwifiex: Initialize the chan_stats array to zero2025-10-01
GHSA
GHSA-2237-jrrh-3624: In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Initialize the chan_stats array to zero The adapter->chan_stats[]2025-10-01
OSV
CVE-2025-39891: In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Initialize the chan_stats array to zero The adapter->chan_stats[] a2025-10-01

📋Vendor Advisories

21
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-04-09
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-04-01
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (AWS) vulnerabilities2026-03-23
CVE-2025-39891 — Sensitive Information Exposure | cvebase