CVE-2025-38291

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
19/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath12k: Prevent sending WMI commands to firmware during firmware crash<br /> <br /> Currently, we encounter the following kernel call trace when a firmware<br /> crash occurs. This happens because the host sends WMI commands to the<br /> firmware while it is in recovery, causing the commands to fail and<br /> resulting in the kernel call trace.<br /> <br /> Set the ATH12K_FLAG_CRASH_FLUSH and ATH12K_FLAG_RECOVERY flags when the<br /> host driver receives the firmware crash notification from MHI. This<br /> prevents sending WMI commands to the firmware during recovery.<br /> <br /> Call Trace:<br /> <br /> dump_stack_lvl+0x75/0xc0<br /> register_lock_class+0x6be/0x7a0<br /> ? __lock_acquire+0x644/0x19a0<br /> __lock_acquire+0x95/0x19a0<br /> lock_acquire+0x265/0x310<br /> ? ath12k_ce_send+0xa2/0x210 [ath12k]<br /> ? find_held_lock+0x34/0xa0<br /> ? ath12k_ce_send+0x56/0x210 [ath12k]<br /> _raw_spin_lock_bh+0x33/0x70<br /> ? ath12k_ce_send+0xa2/0x210 [ath12k]<br /> ath12k_ce_send+0xa2/0x210 [ath12k]<br /> ath12k_htc_send+0x178/0x390 [ath12k]<br /> ath12k_wmi_cmd_send_nowait+0x76/0xa0 [ath12k]<br /> ath12k_wmi_cmd_send+0x62/0x190 [ath12k]<br /> ath12k_wmi_pdev_bss_chan_info_request+0x62/0xc0 [ath1<br /> ath12k_mac_op_get_survey+0x2be/0x310 [ath12k]<br /> ieee80211_dump_survey+0x99/0x240 [mac80211]<br /> nl80211_dump_survey+0xe7/0x470 [cfg80211]<br /> ? kmalloc_reserve+0x59/0xf0<br /> genl_dumpit+0x24/0x70<br /> netlink_dump+0x177/0x360<br /> __netlink_dump_start+0x206/0x280<br /> genl_family_rcv_msg_dumpit.isra.22+0x8a/0xe0<br /> ? genl_family_rcv_msg_attrs_parse.isra.23+0xe0/0xe0<br /> ? genl_op_lock.part.12+0x10/0x10<br /> ? genl_dumpit+0x70/0x70<br /> genl_rcv_msg+0x1d0/0x290<br /> ? nl80211_del_station+0x330/0x330 [cfg80211]<br /> ? genl_get_cmd_both+0x50/0x50<br /> netlink_rcv_skb+0x4f/0x100<br /> genl_rcv+0x1f/0x30<br /> netlink_unicast+0x1b6/0x260<br /> netlink_sendmsg+0x31a/0x450<br /> __sock_sendmsg+0xa8/0xb0<br /> ____sys_sendmsg+0x1e4/0x260<br /> ___sys_sendmsg+0x89/0xe0<br /> ? local_clock_noinstr+0xb/0xc0<br /> ? rcu_is_watching+0xd/0x40<br /> ? kfree+0x1de/0x370<br /> ? __sys_sendmsg+0x7a/0xc0<br /> <br /> Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.3 (excluding)