CVE-2023-53700

Source
https://cve.org/CVERecord?id=CVE-2023-53700
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53700.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53700
Downstream
Related
Published
2025-10-22T13:23:39.560Z
Modified
2026-04-02T09:44:53.892109Z
Summary
media: max9286: Fix memleak in max9286_v4l2_register()
Details

In the Linux kernel, the following vulnerability has been resolved:

media: max9286: Fix memleak in max9286v4l2register()

There is a kmemleak when testing the media/i2c/max9286.c with bpf mock device:

kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak)

unreferenced object 0xffff88810defc400 (size 256): comm "python3", pid 278, jiffies 4294737563 (age 31.978s) hex dump (first 32 bytes): 28 06 a7 0a 81 88 ff ff 00 fe 22 12 81 88 ff ff (........."..... 10 c4 ef 0d 81 88 ff ff 10 c4 ef 0d 81 88 ff ff ................ backtrace: [<00000000191de6a7>] __kmallocnode+0x44/0x1b0 [<000000002f4912b7>] kvmallocnode+0x34/0x180 [<0000000057dc4cae>] v4l2_ctrlnew+0x325/0x10f0 [videodev] [<0000000026030272>] v4l2ctrlnewstd+0x16f/0x210 [videodev] [<00000000f0d9ea2f>] max9286probe+0x76e/0xbff [max9286] [<00000000ea8f6455>] i2cdeviceprobe+0x28d/0x680 [<0000000087529af3>] reallyprobe+0x17c/0x3f0 [<00000000b08be526>] __driverprobedevice+0xe3/0x170 [<000000004382edea>] driverprobedevice+0x49/0x120 [<000000007bde528a>] __deviceattachdriver+0xf7/0x150 [<000000009f9c6ab4>] busforeach_drv+0x114/0x180 [<00000000c8aaf588>] __deviceattach+0x1e5/0x2d0 [<0000000041cc06b9>] busprobedevice+0x126/0x140 [<000000002309860d>] deviceadd+0x810/0x1130 [<000000002827bf98>] i2cnewclientdevice+0x359/0x4f0 [<00000000593bdc85>] ofi2cregisterdevice+0xf1/0x110

max9286v4l2register() calls v4l2ctrlnewstd(), but won't free the created v412ctrl when fwnodegraphgetendpointbyid() failed, which causes the memleak. Call v4l2ctrlhandlerfree() to free the v412_ctrl.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53700.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
66d8c9d2422da21ed41f75c03ba0685987b65fe0
Fixed
505ff3a0c5951684c3a43094ca4c1a74683d5681
Fixed
5897fe3ebe8252993579e1bee715ebfe5504e052
Fixed
724039e013b34f46344abdbf8c74e6a65a828327
Fixed
5e31213fa017c20ccc989033a5f4a626473aa2ca
Fixed
8636c5fc7658c7c6299fb8b352d24ea4b9ba99e2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53700.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53700.json"