CVE-2025-39991
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()
If ab->fw.m3_data points to data, then fw pointer remains null. Further, if m3_mem is not allocated, then fw is dereferenced to be passed to ath11k_err function.
Replace fw->size by m3_len.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in ath11k_qmi_m3_load() occurs when m3_data is set but fw pointer remains null; fix replaces fw->size with m3_len.
Root
Cause
In the Linux kernel's ath11k Wi-Fi driver, the function ath11k_qmi_m3_load() can trigger a NULL pointer dereference. The bug arises because when the driver's firmware data (ab->fw.m3_data) is non-NULL, the fw pointer remains NULL. Later, if m3_m3_mem allocation fails, the code attempts to pass fw->size to ath11k_err(), leading to a NULL dereference. The correct fix is to use m3_len instead of referencing fw->size` [1][2].
Exploitation
Surface
This vulnerability is local, affecting systems running a vulnerable version of the Linux kernel with the ath11k driver loaded. No authentication is explicitly required to trigger the bug under normal driver initialization paths, though the crash occurs during firmware loading which typically happens at boot or module insertion. The flaw was discovered by the Linux Verification Center using the SVACE static analysis tool [1][2].
Impact
A successful exploit of this NULL pointer dereference results in a kernel panic (denial of service). The attacker gains no code execution or privilege escalation, but the crash can render the system unavailable. The impact is limited to availability [1][2].
Mitigation
Patches have been applied to the Linux kernel stable branches. Users should update to a kernel version containing the fix commit 3fd2ef2ae2b5 (or later). No workaround is available other than applying the kernel update [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
41f52119809b7888830b2cbc0500fcc31e4883fd2ef2ae2b5Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.