-
CVE-2023-54093
- EPSS 0.04%
- Veröffentlicht 24.12.2025 13:06:21
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
media: anysee: fix null-ptr-deref in anysee_master_xfer
In anysee_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach anysee_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.
Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
[hverkuil: add spaces around +]Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
73c0b224ceeba12dee2a7a8cbc147648da0b2e63
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
Version <
e04affec2506ff5c12a18d78d7e694b3556a8982
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
Version <
8dc5b370254abc10f0cb4141d90cecf7ce465472
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
Version <
4a9763d2bc4a6d6fab42555b9c0b2eefa32585ac
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
Version <
3dd5846a873938ec7b6d404ec27662942cd8f2ef
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
Version <
14b94154a72388b57221a2a73795c0ea61a95373
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
Version <
5975dbbb7ad0767eaabd15d2c37a739ac76acb00
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
Version <
c30411266fd67ea3c02a05c157231654d5a3bdc9
Version
a51e34dd6080d8d5c9e95a4e0292cd4cb889a61b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.27
Status
affected
Version <
2.6.27
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.326
Status
unaffected
Version <=
4.19.*
Version
4.19.295
Status
unaffected
Version <=
5.4.*
Version
5.4.257
Status
unaffected
Version <=
5.10.*
Version
5.10.197
Status
unaffected
Version <=
5.15.*
Version
5.15.133
Status
unaffected
Version <=
6.1.*
Version
6.1.55
Status
unaffected
Version <=
6.5.*
Version
6.5.5
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|