Bug 2405723 (CVE-2023-53721) - CVE-2023-53721 kernel: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()
Summary: CVE-2023-53721 kernel: wifi: ath12k: Fix a NULL pointer dereference in ath12k...
Keywords:
Status: NEW
Alias: CVE-2023-53721
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-22 14:02 UTC by OSIDB Bzimport
Modified: 2025-10-29 11:59 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-22 14:02:25 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()

In ath12k_mac_op_hw_scan(), the return value of kzalloc() is directly
used in memcpy(), which may lead to a NULL pointer dereference on
failure of kzalloc().

Fix this bug by adding a check of arg.extraie.ptr.

Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0-03427-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1.15378.4


Note You need to log in before you can comment on or make changes to this bug.