VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2023-53721

CVE-2023-53721

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()

In ath12k_mac_op_hw_scan(), the return value of kzalloc() is directly used in memcpy(), which may lead to a NULL pointer dereference on failure of kzalloc().

Fix this bug by adding a check of arg.extraie.ptr.

Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0-03427-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1.15378.4

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A NULL pointer dereference in ath12k_mac_op_hw_scan() due to unchecked kzalloc() return value could allow a local attacker to crash the kernel.

Vulnerability

Description

In the Linux kernel's ath12k wireless driver, the function ath12k_mac_op_hw_scan() allocates memory via kzalloc() for the arg.extraie.ptr field and then directly uses it in a memcpy() call without checking if the allocation succeeded. If kzalloc() fails (e.g., under memory pressure), the pointer is NULL, leading to a NULL pointer dereference when memcpy() attempts to write to it [1].

Exploitation

This vulnerability is triggered during a hardware scan operation on affected ath12k-based Wi-Fi devices (e.g., WCN7850). An attacker with local access and the ability to trigger a scan (e.g., via iw commands or network management tools) could exploit this by inducing memory exhaustion to cause kzalloc() to fail. No special privileges beyond the ability to initiate a Wi-Fi scan are required, as the driver is reachable from user space through standard nl80211 interfaces.

Impact

A successful exploit results in a kernel NULL pointer dereference, causing a system crash (denial of service). The vulnerability does not appear to allow arbitrary code execution or privilege escalation, as the dereference occurs in kernel context and leads to an immediate oops or panic.

Mitigation

Mitigation

The fix adds a check for arg.extraie.ptr after allocation, returning an error if it is NULL, preventing the dereference. The patch has been applied to the Linux kernel stable tree [1]. Users should update to a kernel version containing the fix (e.g., commit 8ad314da54c6). No workaround is available; updating the kernel is the recommended mitigation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.