In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()
In ath12k_mac_op_hw_scan(), the return value of kzalloc() is directly
used in memcpy(), which may lead to a NULL pointer dereference on
failure of kzalloc().
Fix this bug by adding a check of arg.extraie.ptr.
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0-03427-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1.15378.4
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Linux Linux linux Kernel | |
| Vendors & Products | Linux Linux linux Kernel | 
Thu, 23 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
Wed, 22 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan() In ath12k_mac_op_hw_scan(), the return value of kzalloc() is directly used in memcpy(), which may lead to a NULL pointer dereference on failure of kzalloc(). Fix this bug by adding a check of arg.extraie.ptr. Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0-03427-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1.15378.4 | |
| Title | wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan() | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-30T19:33:08.319Z
Reserved: 2025-10-22T13:21:37.348Z
Link: CVE-2023-53721
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-22T14:15:46.803
Modified: 2025-10-22T21:12:48.953
Link: CVE-2023-53721
 Redhat
                        Redhat