CVE-2023-53146

Source
https://cve.org/CVERecord?id=CVE-2023-53146
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53146.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53146
Downstream
Related
Published
2025-05-14T12:43:59.117Z
Modified
2026-03-20T12:32:59.274232Z
Summary
media: dw2102: Fix null-ptr-deref in dw2102_i2c_transfer()
Details

In the Linux kernel, the following vulnerability has been resolved:

media: dw2102: Fix null-ptr-deref in dw2102i2ctransfer()

In dw2102i2ctransfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data finally reach dw2102i2ctransfer. If accessing msg[i].buf[0] without sanity check, null ptr deref would happen. We add check on msg[i].len to prevent crash.

Similar commit: commit 950e252cb469 ("[media] dw2102: limit messages to buffer size")

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53146.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7fd4828f6cc5bd4339ff58e372ccb5f528548b30
Fixed
77cbd42d29de9ffc93d5529bab8813cde53af14c
Fixed
ecbe6d011b95c7da59f014f8d26cb7245ed1e11e
Fixed
beb9550494e7349f92b9eaa283256a5ad9b1c9be
Fixed
97fdbdb750342cbc204befde976872fedb406ee6
Fixed
903566208ae6bb9c0e7e54355ce75bf6cf72485d
Fixed
08dfcbd03b2b7f918c4f87c6ff637054e510df74
Fixed
fb28afab113a82b89ffec48c8155ec05b4f8cb5e
Fixed
5ae544d94abc8ff77b1b9bf8774def3fa5689b5b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53146.json"