CVE-2023-53721 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 92.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()
In ath12k_mac_op_hw_scan(), the return value of kzalloc() is directly
used in memcpy(), which may lead to a NULL pointer dereference on
failure of kzalloc().
Fix this bug by adding a check of arg.extraie.ptr.
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0-03427-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1.15378.4
Affected Packages4 packages
▶CVEListV5linux/linuxd889913205cf7ebda905b1e62c5867ed4e39f6c2 — 5a263df398b581189fe632b4ab8440f3dd76c251+2
🔴Vulnerability Details
3GHSA▶
GHSA-hg4j-jx55-3m9p: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()
In ath12↗2025-10-22
OSV▶
CVE-2023-53721: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan() In ath12k_↗2025-10-22