-

CVE-2025-39732

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()

ath11k_mac_disable_peer_fixed_rate() is passed as the iterator to
ieee80211_iterate_stations_atomic(). Note in this case the iterator is
required to be atomic, however ath11k_mac_disable_peer_fixed_rate() does
not follow it as it might sleep. Consequently below warning is seen:

BUG: sleeping function called from invalid context at wmi.c:304
Call Trace:
 <TASK>
 dump_stack_lvl
 __might_resched.cold
 ath11k_wmi_cmd_send
 ath11k_wmi_set_peer_param
 ath11k_mac_disable_peer_fixed_rate
 ieee80211_iterate_stations_atomic
 ath11k_mac_op_set_bitrate_mask.cold

Change to ieee80211_iterate_stations_mtx() to fix this issue.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 9c0e3144924c7db701575a73af341d33184afeaf
Version d5c65159f2895379e11ca13f62feabe93278985d
Status affected
Version < 7d4d0db0dc9424de2bdc0b45e919e4892603356f
Version d5c65159f2895379e11ca13f62feabe93278985d
Status affected
Version < 6bdef22d540258ca06f079f7b6ae100669a19b47
Version d5c65159f2895379e11ca13f62feabe93278985d
Status affected
Version < 65c12b104cb942d588a1a093acc4537fb3d3b129
Version d5c65159f2895379e11ca13f62feabe93278985d
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.6
Status affected
Version < 5.6
Version 0
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.056
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string