CVE-2023-54093
Description
In the Linux kernel, the following vulnerability has been resolved:
media: anysee: fix null-ptr-deref in anysee_master_xfer
In anysee_master_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data finally reach anysee_master_xfer. If accessing msg[i].buf[0] without sanity check, null ptr deref would happen. We add check on msg[i].len to prevent crash.
Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
[hverkuil: add spaces around +]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Null pointer dereference in Linux kernel anysee driver when handling malformed messages with zero length.
Root
Cause In the Linux kernel's media subsystem, the anysee_master_xfer function in the anysee driver lacks a sanity check on msg[i].len. When msg[i].buf is null and msg[i].len is zero, the former checks on msg[i].buf are bypassed, allowing a null pointer dereference when accessing msg[i].buf[0] without validation. This vulnerability is similar to the fix for the az6027 driver (commit 0ed554fd769a) [1].
Attack
Scenario An attacker with the ability to control the msg structure (e.g., via crafted USB control messages) can trigger the null pointer dereference. No authentication is required if the attacker can physically connect a malicious USB device or interact with the driver through other attack vectors. The attack is local, requiring access to the system's USB subsystem.
Impact
Successful exploitation leads to a kernel crash (denial of service). In some configurations, it could potentially be leveraged for privilege escalation, though the primary impact is system instability.
Mitigation
The fix adds a check on msg[i].len before accessing msg[i].buf[0], preventing the null pointer dereference. The patch has been applied to the stable kernel branches as commits [2] and [3]. Users should update to kernel versions including these commits.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
873c0b224ceebe04affec25068dc5b370254a4a9763d2bc4a3dd5846a873914b94154a7235975dbbb7ad0c30411266fd6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/14b94154a72388b57221a2a73795c0ea61a95373nvd
- git.kernel.org/stable/c/3dd5846a873938ec7b6d404ec27662942cd8f2efnvd
- git.kernel.org/stable/c/4a9763d2bc4a6d6fab42555b9c0b2eefa32585acnvd
- git.kernel.org/stable/c/5975dbbb7ad0767eaabd15d2c37a739ac76acb00nvd
- git.kernel.org/stable/c/73c0b224ceeba12dee2a7a8cbc147648da0b2e63nvd
- git.kernel.org/stable/c/8dc5b370254abc10f0cb4141d90cecf7ce465472nvd
- git.kernel.org/stable/c/c30411266fd67ea3c02a05c157231654d5a3bdc9nvd
- git.kernel.org/stable/c/e04affec2506ff5c12a18d78d7e694b3556a8982nvd
News mentions
0No linked articles in our index yet.