CVE-2026-23133

In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coherent() pointer dma_alloc_coherent() allocates a DMA mapped buffer and stores the addresses in XXX_unaligned fields. Those should be reused when freeing the buffer rather than the aligned addresses.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

17 Mar 2026, 21:16

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/07f363f305793baecad41816f73056252f3df61e - () https://git.kernel.org/stable/c/07f363f305793baecad41816f73056252f3df61e - Patch
References () https://git.kernel.org/stable/c/1928851334ecfd6e0d663121ab69ac639d4217a6 - () https://git.kernel.org/stable/c/1928851334ecfd6e0d663121ab69ac639d4217a6 - Patch
References () https://git.kernel.org/stable/c/5d6fa4d2c9799c09389588da5118a72d97d87e92 - () https://git.kernel.org/stable/c/5d6fa4d2c9799c09389588da5118a72d97d87e92 - Patch
References () https://git.kernel.org/stable/c/9282a1e171ad8d2205067e8ec3bbe4e3cef4f29f - () https://git.kernel.org/stable/c/9282a1e171ad8d2205067e8ec3bbe4e3cef4f29f - Patch
References () https://git.kernel.org/stable/c/b0ad924332a96550a84b8c0ae5483e7042d65fa9 - () https://git.kernel.org/stable/c/b0ad924332a96550a84b8c0ae5483e7042d65fa9 - Patch
References () https://git.kernel.org/stable/c/e2dda298ef809aa201ea7c0904c4d064f6c497cb - () https://git.kernel.org/stable/c/e2dda298ef809aa201ea7c0904c4d064f6c497cb - Patch
References () https://git.kernel.org/stable/c/fc8da65f9fe1bc6802f8240b342cfff4f5c7e841 - () https://git.kernel.org/stable/c/fc8da65f9fe1bc6802f8240b342cfff4f5c7e841 - Patch

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: wifi: ath10k: corrección del puntero dma_free_coherent() dma_alloc_coherent() asigna un búfer mapeado por DMA y almacena las direcciones en campos XXX_unaligned. Esas deberían ser reutilizadas al liberar el búfer en lugar de las direcciones alineadas.

14 Feb 2026, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-14 16:15

Updated : 2026-03-17 21:16


NVD link : CVE-2026-23133

Mitre link : CVE-2026-23133

CVE.ORG link : CVE-2026-23133


JSON object : View

Products Affected

linux

  • linux_kernel