Linux Kernel anysee nullptr-deref in anysee_master_xfer
CVE-2023-54093 Published on December 24, 2025
media: anysee: fix null-ptr-deref in anysee_master_xfer
In the Linux kernel, the following vulnerability has been resolved:
media: anysee: fix null-ptr-deref in anysee_master_xfer
In anysee_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach anysee_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.
Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
[hverkuil: add spaces around +]
Products Associated with CVE-2023-54093
stack.watch emails you whenever new vulnerabilities are published in Linux Kernel or Linux Kernel. Just hit a watch button to start following.
Affected Versions
Linux:- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below 73c0b224ceeba12dee2a7a8cbc147648da0b2e63 is affected.
- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below e04affec2506ff5c12a18d78d7e694b3556a8982 is affected.
- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below 8dc5b370254abc10f0cb4141d90cecf7ce465472 is affected.
- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below 4a9763d2bc4a6d6fab42555b9c0b2eefa32585ac is affected.
- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below 3dd5846a873938ec7b6d404ec27662942cd8f2ef is affected.
- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below 14b94154a72388b57221a2a73795c0ea61a95373 is affected.
- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below 5975dbbb7ad0767eaabd15d2c37a739ac76acb00 is affected.
- Version a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b and below c30411266fd67ea3c02a05c157231654d5a3bdc9 is affected.
- Version 2.6.27 is affected.
- Before 2.6.27 is unaffected.
- Version 4.14.326, <= 4.14.* is unaffected.
- Version 4.19.295, <= 4.19.* is unaffected.
- Version 5.4.257, <= 5.4.* is unaffected.
- Version 5.10.197, <= 5.10.* is unaffected.
- Version 5.15.133, <= 5.15.* is unaffected.
- Version 6.1.55, <= 6.1.* is unaffected.
- Version 6.5.5, <= 6.5.* is unaffected.
- Version 6.6, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.