CVE-2023-53721NULL Pointer Dereference in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 92.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan() In ath12k_mac_op_hw_scan(), the return value of kzalloc() is directly used in memcpy(), which may lead to a NULL pointer dereference on failure of kzalloc(). Fix this bug by adding a check of arg.extraie.ptr. Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0-03427-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1.15378.4

Affected Packages4 packages

Linuxlinux/linux_kernel6.3.06.5.5
Debianlinux/linux_kernel< 6.5.6-1+1
CVEListV5linux/linuxd889913205cf7ebda905b1e62c5867ed4e39f6c25a263df398b581189fe632b4ab8440f3dd76c251+2
debiandebian/linux< linux 6.5.6-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-hg4j-jx55-3m9p: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan() In ath122025-10-22
OSV
wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()2025-10-22
OSV
CVE-2023-53721: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan() In ath12k_2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()2025-10-22
Debian
CVE-2023-53721: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12...2023