๐Ÿ” CVE Alert

CVE-2025-39864

UNKNOWN 0.0

wifi: cfg80211: fix use-after-free in cmp_bss()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix use-after-free in cmp_bss() Following bss_free() quirk introduced in commit 776b3580178f ("cfg80211: track hidden SSID networks properly"), adjust cfg80211_update_known_bss() to free the last beacon frame elements only if they're not shared via the corresponding 'hidden_beacon_bss' pointer.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 19, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < a8bb681e879ca3c9f722aa08d3d7ae41c42a8807 3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < a97a9791e455bb0cd5e7a38b5abcb05523d4e21c 3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < ff040562c10a540b8d851f7f4145fa112977f853 3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < 6854476d9e1aeaaf05ebc98d610061c2075db07d 3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < b7d08929178c16398278613df07ad65cf63cce9d 3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < 5b7ae04969f822283a95c866967e42b4d75e0eef 3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < 912c4b66bef713a20775cfbf3b5e9bd71525c716 3ab8227d3e7d1d2bf1829675d3197e3cb600e9f6 < 26e84445f02ce6b2fe5f3e0e28ff7add77f35e08
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a8bb681e879ca3c9f722aa08d3d7ae41c42a8807 git.kernel.org: https://git.kernel.org/stable/c/a97a9791e455bb0cd5e7a38b5abcb05523d4e21c git.kernel.org: https://git.kernel.org/stable/c/ff040562c10a540b8d851f7f4145fa112977f853 git.kernel.org: https://git.kernel.org/stable/c/6854476d9e1aeaaf05ebc98d610061c2075db07d git.kernel.org: https://git.kernel.org/stable/c/b7d08929178c16398278613df07ad65cf63cce9d git.kernel.org: https://git.kernel.org/stable/c/5b7ae04969f822283a95c866967e42b4d75e0eef git.kernel.org: https://git.kernel.org/stable/c/912c4b66bef713a20775cfbf3b5e9bd71525c716 git.kernel.org: https://git.kernel.org/stable/c/26e84445f02ce6b2fe5f3e0e28ff7add77f35e08 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-089022.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html