Impact
The ath12k wireless driver has a race condition that can deadlock the kernel when management frames are queued and the flush routine is invoked with a null virtual interface. Because the flushing operation holds the wiphy lock, the queued transmission work cannot run, leading to a deadlock and abandonment of authentication and association steps. The failure manifests as repeated authentication attempts that finally abort, leaving the wireless interface unusable. This flaw is a classic resource exhaustion error classified as CWE‑667.
Affected Systems
The issue exists in the Linux kernel Wi‑Fi subsystem for the ath12k driver across kernel 6.19 release candidates 1 through 6. The affected systems are any installations of the Linux kernel matching the CPE strings cpe:2.3:o:linux:linux_kernel:6.19:rc1, cpe:2.3:o:linux:linux_kernel:6.19:rc2, cpe:2.3:o:linux:linux_kernel:6.19:rc3, cpe:2.3:o:linux:linux_kernel:6.19:rc4, cpe:2.3:o:linux:linux_kernel:6.19:rc5, or cpe:2.3:o:linux:linux_kernel:6.19:rc6 that include the ath12k module without the patch. Systems running a custom or older kernel that builds ath12k from source are also at risk if the commit is not integrated.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1 % shows that exploitation is considered unlikely. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local: it requires a process that can trigger a flush of the management transmission queue for the ath12k driver, such as a privileged application or an attacker with physical access to the machine. The impact is confined to Wi‑Fi connectivity, causing a denial of service to wireless network access but not enabling remote code execution or privilege escalation.
OpenCVE Enrichment