CVE-2025-39746

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2025
Last modified:
15/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath10k: shutdown driver when hardware is unreliable<br /> <br /> In rare cases, ath10k may lose connection with the PCIe bus due to<br /> some unknown reasons, which could further lead to system crashes during<br /> resuming due to watchdog timeout:<br /> <br /> ath10k_pci 0000:01:00.0: wmi command 20486 timeout, restarting hardware<br /> ath10k_pci 0000:01:00.0: already restarting<br /> ath10k_pci 0000:01:00.0: failed to stop WMI vdev 0: -11<br /> ath10k_pci 0000:01:00.0: failed to stop vdev 0: -11<br /> ieee80211 phy0: PM: **** DPM device timeout ****<br /> Call Trace:<br /> panic+0x125/0x315<br /> dpm_watchdog_set+0x54/0x54<br /> dpm_watchdog_handler+0x57/0x57<br /> call_timer_fn+0x31/0x13c<br /> <br /> At this point, all WMI commands will timeout and attempt to restart<br /> device. So set a threshold for consecutive restart failures. If the<br /> threshold is exceeded, consider the hardware is unreliable and all<br /> ath10k operations should be skipped to avoid system crash.<br /> <br /> fail_cont_count and pending_recovery are atomic variables, and<br /> do not involve complex conditional logic. Therefore, even if recovery<br /> check and reconfig complete are executed concurrently, the recovery<br /> mechanism will not be broken.<br /> <br /> Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1

Impact