CVE-2025-39746

Source
https://cve.org/CVERecord?id=CVE-2025-39746
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39746.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39746
Downstream
Related
Published
2025-09-11T16:52:19.112Z
Modified
2026-03-20T12:43:02.213625Z
Summary
wifi: ath10k: shutdown driver when hardware is unreliable
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: shutdown driver when hardware is unreliable

In rare cases, ath10k may lose connection with the PCIe bus due to some unknown reasons, which could further lead to system crashes during resuming due to watchdog timeout:

ath10kpci 0000:01:00.0: wmi command 20486 timeout, restarting hardware ath10kpci 0000:01:00.0: already restarting ath10kpci 0000:01:00.0: failed to stop WMI vdev 0: -11 ath10kpci 0000:01:00.0: failed to stop vdev 0: -11 ieee80211 phy0: PM: **** DPM device timeout **** Call Trace: panic+0x125/0x315 dpmwatchdogset+0x54/0x54 dpmwatchdoghandler+0x57/0x57 calltimerfn+0x31/0x13c

At this point, all WMI commands will timeout and attempt to restart device. So set a threshold for consecutive restart failures. If the threshold is exceeded, consider the hardware is unreliable and all ath10k operations should be skipped to avoid system crash.

failcontcount and pending_recovery are atomic variables, and do not involve complex conditional logic. Therefore, even if recovery check and reconfig complete are executed concurrently, the recovery mechanism will not be broken.

Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39746.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e3dd157d7e70f0e3cea3f2573ed69fb156a19d5
Fixed
201c9b4485edc618863a60f97a2d88bddd139467
Fixed
e36991bddf8be63e79659f654cdb1722db4e8132
Fixed
84ca5632b8d05d1c2e25604d1d63434b2fb61c85
Fixed
c256a94d1b1b15109740306f7f2a7c2173e12072

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39746.json"