Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan() In ath12k_mac_op_hw_scan(), the return value of kzalloc() is directly used in memcpy(), which may lead to a NULL pointer dereference on failure of kzalloc(). Fix this bug by adding a check of arg.extraie.ptr. Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0-03427-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1.15378.4

PUBLISHED Reserved 2025-10-22 | Published 2025-10-22 | Updated 2025-10-30 | Assigner Linux

Product status

Default status
unaffected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before 5a263df398b581189fe632b4ab8440f3dd76c251
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 (git) before 8ad314da54c6dd223a6b6cc85019160aa842f659
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.5.5 (semver)
unaffected

6.6 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5a263df398b581189fe632b4ab8440f3dd76c251

git.kernel.org/...c/8ad314da54c6dd223a6b6cc85019160aa842f659

cve.org (CVE-2023-53721)

nvd.nist.gov (CVE-2023-53721)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.