CVE-2023-53146
14.05.2025, 13:15
In the Linux kernel, the following vulnerability has been resolved:
media: dw2102: Fix null-ptr-deref in dw2102_i2c_transfer()
In dw2102_i2c_transfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach dw2102_i2c_transfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.
Similar commit:
commit 950e252cb469
("[media] dw2102: limit messages to buffer size")Enginsight| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 𝑥 < 4.14.326 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.295 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.257 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.197 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.133 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.55 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.5.5 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References