{ "schema_version": "1.4.0", "id": "GHSA-5vxv-jx6g-44wr", "modified": "2025-09-07T18:31:27Z", "published": "2025-09-07T18:31:27Z", "aliases": [ "CVE-2025-39732" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()\n\nath11k_mac_disable_peer_fixed_rate() is passed as the iterator to\nieee80211_iterate_stations_atomic(). Note in this case the iterator is\nrequired to be atomic, however ath11k_mac_disable_peer_fixed_rate() does\nnot follow it as it might sleep. Consequently below warning is seen:\n\nBUG: sleeping function called from invalid context at wmi.c:304\nCall Trace:\n \n dump_stack_lvl\n __might_resched.cold\n ath11k_wmi_cmd_send\n ath11k_wmi_set_peer_param\n ath11k_mac_disable_peer_fixed_rate\n ieee80211_iterate_stations_atomic\n ath11k_mac_op_set_bitrate_mask.cold\n\nChange to ieee80211_iterate_stations_mtx() to fix this issue.\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-39732" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/65c12b104cb942d588a1a093acc4537fb3d3b129" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6bdef22d540258ca06f079f7b6ae100669a19b47" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/7d4d0db0dc9424de2bdc0b45e919e4892603356f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/9c0e3144924c7db701575a73af341d33184afeaf" } ], "database_specific": { "cwe_ids": [], "severity": null, "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-07T16:15:48Z" } }