Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix dma_free_coherent() pointer

dma_alloc_coherent() allocates a DMA mapped buffer and stores the
addresses in XXX_unaligned fields. Those should be reused when freeing
the buffer rather than the aligned addresses.
Published: 2026-02-14
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel memory corruption via incorrect DMA buffer deallocation
Action: Apply patch
AI Analysis

Impact

In the Linux ath12k Wi‑Fi driver, dma_alloc_coherent allocates a DMA buffer and stores the returned addresses in unaligned fields. However, the code that frees the buffer mistakenly uses the aligned addresses stored elsewhere instead of the original unaligned pointer. This misuse of dma_free_coherent can corrupt kernel memory when the kernel deallocates memory that is still in use. The vulnerability, reflected in a CVSS score of 5.5, poses a moderate risk of kernel instability or crash.

Affected Systems

All Linux kernel releases that ship the vulnerable ath12k driver code and have not applied the patch, particularly the 6.19 release‑candidate series up to rc6 and any earlier kernels that include the same code. Any distribution incorporating these kernels, whether as stock releases or as part of a maintenance update, is potentially affected unless upgraded to an image containing the fix.

Risk and Exploitability

The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, indicating a low likelihood of exploitation. Based on the description, it is inferred that an attacker would need privileged or local access to the host and the ability to trigger the ath12k driver, for example by sending crafted wireless traffic or manually loading the driver. The impact is limited to kernel memory corruption and potential denial of service; no direct evidence of remote code execution is provided.

Generated by OpenCVE AI on April 18, 2026 at 18:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the ath12k dma_free_coherent fix
  • If an immediate kernel upgrade is not possible, disable the ath12k Wi‑Fi interface or replace the hardware with a driver that is not affected
  • Test the updated kernel or isolated environment before deploying to production

Generated by OpenCVE AI on April 18, 2026 at 18:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Tue, 17 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Sat, 14 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coherent() pointer dma_alloc_coherent() allocates a DMA mapped buffer and stores the addresses in XXX_unaligned fields. Those should be reused when freeing the buffer rather than the aligned addresses.
Title wifi: ath12k: fix dma_free_coherent() pointer
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-14T15:14:34.473Z

Reserved: 2026-01-13T15:37:45.971Z

Link: CVE-2026-23135

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-14T16:15:53.483

Modified: 2026-03-17T21:16:17.760

Link: CVE-2026-23135

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-14T00:00:00Z

Links: CVE-2026-23135 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:15:06Z

Weaknesses