VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54093

CVE-2023-54093

Description

In the Linux kernel, the following vulnerability has been resolved:

media: anysee: fix null-ptr-deref in anysee_master_xfer

In anysee_master_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data finally reach anysee_master_xfer. If accessing msg[i].buf[0] without sanity check, null ptr deref would happen. We add check on msg[i].len to prevent crash.

Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")

[hverkuil: add spaces around +]

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Null pointer dereference in Linux kernel anysee driver when handling malformed messages with zero length.

Root

Cause In the Linux kernel's media subsystem, the anysee_master_xfer function in the anysee driver lacks a sanity check on msg[i].len. When msg[i].buf is null and msg[i].len is zero, the former checks on msg[i].buf are bypassed, allowing a null pointer dereference when accessing msg[i].buf[0] without validation. This vulnerability is similar to the fix for the az6027 driver (commit 0ed554fd769a) [1].

Attack

Scenario An attacker with the ability to control the msg structure (e.g., via crafted USB control messages) can trigger the null pointer dereference. No authentication is required if the attacker can physically connect a malicious USB device or interact with the driver through other attack vectors. The attack is local, requiring access to the system's USB subsystem.

Impact

Successful exploitation leads to a kernel crash (denial of service). In some configurations, it could potentially be leveraged for privilege escalation, though the primary impact is system instability.

Mitigation

The fix adds a check on msg[i].len before accessing msg[i].buf[0], preventing the null pointer dereference. The patch has been applied to the stable kernel branches as commits [2] and [3]. Users should update to kernel versions including these commits.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.