{"id":"CVE-2025-39732","summary":"wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()\n\nath11k_mac_disable_peer_fixed_rate() is passed as the iterator to\nieee80211_iterate_stations_atomic(). Note in this case the iterator is\nrequired to be atomic, however ath11k_mac_disable_peer_fixed_rate() does\nnot follow it as it might sleep. Consequently below warning is seen:\n\nBUG: sleeping function called from invalid context at wmi.c:304\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl\n __might_resched.cold\n ath11k_wmi_cmd_send\n ath11k_wmi_set_peer_param\n ath11k_mac_disable_peer_fixed_rate\n ieee80211_iterate_stations_atomic\n ath11k_mac_op_set_bitrate_mask.cold\n\nChange to ieee80211_iterate_stations_mtx() to fix this issue.\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30","modified":"2026-03-20T12:43:01.853384Z","published":"2025-09-07T15:16:20.684Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39732.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/65c12b104cb942d588a1a093acc4537fb3d3b129"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6bdef22d540258ca06f079f7b6ae100669a19b47"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7d4d0db0dc9424de2bdc0b45e919e4892603356f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9c0e3144924c7db701575a73af341d33184afeaf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39732.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39732"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d5c65159f2895379e11ca13f62feabe93278985d"},{"fixed":"9c0e3144924c7db701575a73af341d33184afeaf"},{"fixed":"7d4d0db0dc9424de2bdc0b45e919e4892603356f"},{"fixed":"6bdef22d540258ca06f079f7b6ae100669a19b47"},{"fixed":"65c12b104cb942d588a1a093acc4537fb3d3b129"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39732.json"}}],"schema_version":"1.7.5"}