CVE-2023-53244

Source
https://cve.org/CVERecord?id=CVE-2023-53244
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53244.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53244
Downstream
Related
Published
2025-09-15T14:46:12.951Z
Modified
2026-04-02T09:43:50.845501Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish
Details

In the Linux kernel, the following vulnerability has been resolved:

media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish

When the driver calls tw68riscbuffer() to prepare the buffer, the function call dmaalloccoherent may fail, resulting in a empty buffer buf->cpu. Later when we free the buffer or access the buffer, null ptr deref is triggered.

This bug is similar to the following one: https://git.linuxtv.org/media_stage.git/commit/?id=2b064d91440b33fba5b452f2d1b31f13ae911d71.

We believe the bug can be also dynamically triggered from user side. Similarly, we fix this by checking the return value of tw68riscbuffer() and the value of buf->cpu before buffer free.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53244.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e15d1c12c5878b3a80d6573af1721e17264e0286
Fixed
dcf632bca424e6ff8c8eb89c96694e7f05cd29b6
Fixed
3c67f49a6643d973e83968ea35806c7b5ae68b56
Fixed
3715c5e9a8f96b6ed0dcbea06da443efccac1ecc
Fixed
1634b7adcc5bef645b3666fdd564e5952a9e24e0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53244.json"