DEBIAN-CVE-2023-53700

Source
https://security-tracker.debian.org/tracker/CVE-2023-53700
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53700.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-53700
Upstream
Published
2025-10-22T14:15:44.547Z
Modified
2025-11-20T10:16:59.614771Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: media: max9286: Fix memleak in max9286v4l2register() There is a kmemleak when testing the media/i2c/max9286.c with bpf mock device: kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) unreferenced object 0xffff88810defc400 (size 256): comm "python3", pid 278, jiffies 4294737563 (age 31.978s) hex dump (first 32 bytes): 28 06 a7 0a 81 88 ff ff 00 fe 22 12 81 88 ff ff (........."..... 10 c4 ef 0d 81 88 ff ff 10 c4 ef 0d 81 88 ff ff ................ backtrace: [<00000000191de6a7>] _kmallocnode+0x44/0x1b0 [<000000002f4912b7>] kvmallocnode+0x34/0x180 [<0000000057dc4cae>] v4l2ctrlnew+0x325/0x10f0 [videodev] [<0000000026030272>] v4l2ctrlnewstd+0x16f/0x210 [videodev] [<00000000f0d9ea2f>] max9286probe+0x76e/0xbff [max9286] [<00000000ea8f6455>] i2cdeviceprobe+0x28d/0x680 [<0000000087529af3>] reallyprobe+0x17c/0x3f0 [<00000000b08be526>] _driverprobedevice+0xe3/0x170 [<000000004382edea>] driverprobedevice+0x49/0x120 [<000000007bde528a>] _deviceattachdriver+0xf7/0x150 [<000000009f9c6ab4>] busforeachdrv+0x114/0x180 [<00000000c8aaf588>] _deviceattach+0x1e5/0x2d0 [<0000000041cc06b9>] busprobedevice+0x126/0x140 [<000000002309860d>] deviceadd+0x810/0x1130 [<000000002827bf98>] i2cnewclientdevice+0x359/0x4f0 [<00000000593bdc85>] ofi2cregisterdevice+0xf1/0x110 max9286v4l2register() calls v4l2ctrlnewstd(), but won't free the created v412ctrl when fwnodegraphgetendpointbyid() failed, which causes the memleak. Call v4l2ctrlhandlerfree() to free the v412_ctrl.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.178-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}