CVE-2023-54066
Description
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer
In gl861_i2c_master_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data finally reach gl861_i2c_master_xfer. If accessing msg[i].buf[0] without sanity check, null ptr deref would happen. We add check on msg[i].len to prevent crash.
Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Null pointer dereference in Linux kernel's gl861 I2C driver allows local users to crash the system via crafted I2C messages.
Vulnerability
In the Linux kernel's DVB USB driver for gl861, the function gl861_i2c_master_xfer lacks a sanity check on msg[i].len. When a user-controlled I2C message has a null buf and zero len, earlier checks on buf are bypassed, leading to a null pointer dereference when accessing msg[i].buf[0] [1][2].
Exploitation
An attacker with local access to the system can send malicious I2C messages through the DVB USB device interface. No special privileges beyond the ability to interact with the device are required [1].
Impact
Successful exploitation results in a kernel crash (denial of service). The vulnerability does not appear to allow privilege escalation or arbitrary code execution based on the available information [2].
Mitigation
The fix has been backported to stable kernel trees. Users should update their Linux kernel to a version containing the commit that adds the missing length check [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5578b67614ae02a33fc57133ddfcd3c01020972af676551efb97719a66970Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/2a33fc57133d6f39d62285df6706aeb1714967f1nvd
- git.kernel.org/stable/c/578b67614ae0e4fba3945b66a4c8f9ae77115bcbnvd
- git.kernel.org/stable/c/72af676551efe820e309a6c7681c2c4372f37376nvd
- git.kernel.org/stable/c/b97719a66970601cd3151a3e2020f4454a1c4ff6nvd
- git.kernel.org/stable/c/dfcd3c010209927b9f45b860f046635dc32e32e1nvd
News mentions
0No linked articles in our index yet.