CVE-2025-39891
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
| linux | linux_kernel | 5.10.244 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's mwifiex wifi driver involves the chan_stats array not being properly initialized to zero. The array is allocated with vmalloc(), which does not zero memory, and it may be queried by users before being fully filled or initialized by the driver functions. This can lead to uninitialized memory being exposed, potentially leaking sensitive information. Additionally, the array is small enough that using kcalloc() (which zeros memory) would be more appropriate than vmalloc().
How can this vulnerability impact me? :
The vulnerability can lead to an information leak where uninitialized memory contents are exposed to users querying the chan_stats array. This could potentially reveal sensitive or unintended data from kernel memory, which might be exploited by attackers to gain information about the system or its state.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the mwifiex driver properly initializes the chan_stats array to zero, replacing vmalloc() with kcalloc() in mwifiex_init_channel_scan_gap(). This prevents potential information leaks by ensuring the array is zeroed before use.