๐Ÿ” CVE Alert

CVE-2025-23129

UNKNOWN 0.0

wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path If a shared IRQ is used by the driver due to platform limitation, then the IRQ affinity hint is set right after the allocation of IRQ vectors in ath11k_pci_alloc_msi(). This does no harm unless one of the functions requesting the IRQ fails and attempt to free the IRQ. This results in the below warning: WARNING: CPU: 7 PID: 349 at kernel/irq/manage.c:1929 free_irq+0x278/0x29c Call trace: free_irq+0x278/0x29c ath11k_pcic_free_irq+0x70/0x10c [ath11k] ath11k_pci_probe+0x800/0x820 [ath11k_pci] local_pci_probe+0x40/0xbc The warning is due to not clearing the affinity hint before freeing the IRQs. So to fix this issue, clear the IRQ affinity hint before calling ath11k_pcic_free_irq() in the error path. The affinity will be cleared once again further down the error path due to code organization, but that does no harm. Tested-on: QCA6390 hw2.0 PCI WLAN.HST.1.0.1-05266-QCAHSTSWPLZ_V2_TO_X86-1

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
39564b475ac5a589e6c22c43a08cbd283c295d2c < 80dc5a2ce5b75d648e08549617f5c555d07ae43c 39564b475ac5a589e6c22c43a08cbd283c295d2c < 3fc42cfcc6e336f25dee79b34e57c4a63cd652a5 39564b475ac5a589e6c22c43a08cbd283c295d2c < 68410c5bd381a81bcc92b808e7dc4e6b9ed25d11 e01b3400d641cb290742849331f0d22e1202538a 5a9f55efa9333e3edb4826d945cfdd8356f6e269 d412d0ef300f28d698648cc7c19147ab413251fe
Linux / Linux
6.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/80dc5a2ce5b75d648e08549617f5c555d07ae43c git.kernel.org: https://git.kernel.org/stable/c/3fc42cfcc6e336f25dee79b34e57c4a63cd652a5 git.kernel.org: https://git.kernel.org/stable/c/68410c5bd381a81bcc92b808e7dc4e6b9ed25d11