CVE-2023-53497NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: media: vsp1: Replace vb2_is_streaming() with vb2_start_streaming_called() The vsp1 driver uses the vb2_is_streaming() function in its .buf_queue() handler to check if the .start_streaming() operation has been called, and decide whether to just add the buffer to an internal queue, or also trigger a hardware run. vb2_is_streaming() relies on the vb2_queue structure's streaming field, which used to be set only after calling the .

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.26.2.15+1
Debianlinux/linux_kernel< 6.3.7-1+1
CVEListV5linux/linuxa10b215325740376ed551814a37d1f8e9d6b1ced960dc0aa4aa149f6f39125394f4feb51b7addc60+3
debiandebian/linux< linux 6.3.7-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-9pg5-vgmp-j2j8: In the Linux kernel, the following vulnerability has been resolved: media: vsp1: Replace vb2_is_streaming() with vb2_start_streaming_called() The vs2025-10-01
OSV
CVE-2023-53497: In the Linux kernel, the following vulnerability has been resolved: media: vsp1: Replace vb2_is_streaming() with vb2_start_streaming_called() The vsp12025-10-01

📋Vendor Advisories

2
Red Hat
kernel: media: vsp1: Replace vb2_is_streaming() with vb2_start_streaming_called()2025-10-01
Debian
CVE-2023-53497: linux - In the Linux kernel, the following vulnerability has been resolved: media: vsp1...2023