Impact
A flaw in the ath10k wireless driver for the Linux kernel causes the DMA buffer freeing routine to use the wrong pointer. The allocation routine saves both aligned and unaligned addresses; the free routine should reuse the unaligned pointer but currently uses the aligned one. This mismatch can corrupt kernel memory, potentially allowing an attacker to alter kernel data structures. The official CVE text only states the risk of memory corruption; specific downstream effects such as privilege escalation are inferred but not explicitly documented in the input.
Affected Systems
All Linux kernel builds that include the ath10k driver and have not yet incorporated the fix commit are affected. This includes the generic Linux kernel and the 6.19 release‑candidate series from rc1 through rc6 as identified by the CPE strings. Users running any of these kernel versions without the patch are vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate likelihood of exploitation. The EPSS score of less than 1% suggests that the probability of an exploit being observed is very low. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require an attacker able to trigger a DMA operation in the ath10k driver, which could be achieved via crafted network traffic or malformed wireless packets, implying a local or remote network‑based attack vector. These details are inferred from the description rather than explicitly stated in the source.
OpenCVE Enrichment
Ubuntu USN