VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54279

CVE-2023-54279

Description

In the Linux kernel, the following vulnerability has been resolved:

MIPS: fw: Allow firmware to pass a empty env

fw_getenv will use env entry to determine style of env, however it is legal for firmware to just pass a empty list.

Check if first entry exist before running strchr to avoid null pointer dereference.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a null pointer dereference in MIPS firmware environment parsing is fixed by checking for an empty list before calling strchr.

Vulnerability

Vulnerability

CVE-2023-54279 is a null pointer dereference vulnerability in the Linux kernel's MIPS architecture firmware interface. The fw_getenv function uses an environment entry to determine the style of the environment, but it does not account for the case where the firmware passes an empty list. This leads to a null pointer dereference when strchr is called on a non-existent first entry [1][2][3].

Exploitation

An attacker with the ability to control or influence the firmware environment passed to the kernel could trigger this bug. The attack surface is limited to systems using MIPS firmware that can supply an empty environment list. No authentication is required, but the attacker must be able to modify the firmware environment or boot parameters [1][2][3].

Impact

Successful exploitation results in a kernel crash (denial of service) due to the null pointer dereference. This could cause system instability or a complete system hang. There is no indication of privilege escalation or data corruption from this vulnerability [1][2][3].

Mitigation

The fix is included in Linux kernel stable updates. Users should apply the latest kernel updates from their distribution. The commit identifiers are a6b54af40787, 0f91290774c7, and 47e61cadc7a5 [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.