CVE-2025-39732
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-07

Last updated on: 2025-11-25

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() ath11k_mac_disable_peer_fixed_rate() is passed as the iterator to ieee80211_iterate_stations_atomic(). Note in this case the iterator is required to be atomic, however ath11k_mac_disable_peer_fixed_rate() does not follow it as it might sleep. Consequently below warning is seen: BUG: sleeping function called from invalid context at wmi.c:304 Call Trace: <TASK> dump_stack_lvl __might_resched.cold ath11k_wmi_cmd_send ath11k_wmi_set_peer_param ath11k_mac_disable_peer_fixed_rate ieee80211_iterate_stations_atomic ath11k_mac_op_set_bitrate_mask.cold Change to ieee80211_iterate_stations_mtx() to fix this issue. Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-07
Last Modified
2025-11-25
Generated
2026-05-07
AI Q&A
2025-09-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's wifi driver for ath11k. The function ath11k_mac_disable_peer_fixed_rate() is used as an iterator in ieee80211_iterate_stations_atomic(), which requires the iterator to be atomic (non-sleeping). However, ath11k_mac_disable_peer_fixed_rate() may sleep, causing a BUG warning due to a sleeping function being called from an invalid atomic context. The issue is fixed by changing to ieee80211_iterate_stations_mtx(), which allows sleeping.


How can this vulnerability impact me? :

This vulnerability can cause kernel warnings and potential instability or crashes because a sleeping function is called in an atomic context where sleeping is not allowed. This can affect the reliability of the wifi driver and overall system stability on affected devices.


What immediate steps should I take to mitigate this vulnerability?

Update the Linux kernel to a version where the vulnerability is fixed by changing ieee80211_iterate_stations_atomic() to ieee80211_iterate_stations_mtx() in the ath11k driver, specifically addressing the sleeping-in-atomic context issue in ath11k_mac_op_set_bitrate_mask().


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart