In the Linux kernel, the following vulnerability has been resolved:
media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish
When the driver calls tw68_risc_buffer() to prepare the buffer, the
function call dma_alloc_coherent may fail, resulting in a empty buffer
buf->cpu. Later when we free the buffer or access the buffer, null ptr
deref is triggered.
This bug is similar to the following one:
https://git.linuxtv.org/media_stage.git/commit/?id=2b064d91440b33fba5b452f2d1b31f13ae911d71.
We believe the bug can be also dynamically triggered from user side.
Similarly, we fix this by checking the return value of tw68_risc_buffer()
and the value of buf->cpu before buffer free.
References
Configurations
Configuration 1 (hide)
|
History
03 Dec 2025, 19:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/1634b7adcc5bef645b3666fdd564e5952a9e24e0 - Patch | |
| References | () https://git.kernel.org/stable/c/3715c5e9a8f96b6ed0dcbea06da443efccac1ecc - Patch | |
| References | () https://git.kernel.org/stable/c/3c67f49a6643d973e83968ea35806c7b5ae68b56 - Patch | |
| References | () https://git.kernel.org/stable/c/dcf632bca424e6ff8c8eb89c96694e7f05cd29b6 - Patch | |
| CWE | CWE-476 |
Information
Published : 2025-09-15 15:15
Updated : 2025-12-03 19:48
NVD link : CVE-2023-53244
Mitre link : CVE-2023-53244
CVE.ORG link : CVE-2023-53244
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
