CVE-2023-53349
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: ov2740: Fix memleak in ov2740_init_controls()<br />
<br />
There is a kmemleak when testing the media/i2c/ov2740.c with bpf mock<br />
device:<br />
<br />
unreferenced object 0xffff8881090e19e0 (size 16):<br />
comm "51-i2c-ov2740", pid 278, jiffies 4294781584 (age 23.613s)<br />
hex dump (first 16 bytes):<br />
00 f3 7c 0b 81 88 ff ff 80 75 6a 09 81 88 ff ff ..|......uj.....<br />
backtrace:<br />
[] __kmalloc_node+0x44/0x1b0<br />
[] kvmalloc_node+0x34/0x180<br />
[] v4l2_ctrl_handler_init_class+0x11d/0x180<br />
[videodev]<br />
[] ov2740_probe+0x37d/0x84f [ov2740]<br />
[] i2c_device_probe+0x28d/0x680<br />
[] really_probe+0x17c/0x3f0<br />
[] __driver_probe_device+0xe3/0x170<br />
[] device_driver_attach+0x34/0x80<br />
[] bind_store+0x10b/0x1a0<br />
[] drv_attr_store+0x49/0x70<br />
[] sysfs_kf_write+0x8c/0xb0<br />
[] kernfs_fop_write_iter+0x216/0x2e0<br />
[] vfs_write+0x658/0x810<br />
[] ksys_write+0xd6/0x1b0<br />
[] do_syscall_64+0x38/0x90<br />
[] entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
<br />
ov2740_init_controls() won&#39;t clean all the allocated resources in fail<br />
path, which may causes the memleaks. Add v4l2_ctrl_handler_free() to<br />
prevent memleak.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8 (including) | 5.10.173 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2d899592ed7829d0d5140853bac4d58742a6b8af
- https://git.kernel.org/stable/c/3969b2ebc66039306f505c7c630c5530800f83c0
- https://git.kernel.org/stable/c/7c405ee63447f14eefcfe12a18aa749abbd596ea
- https://git.kernel.org/stable/c/a163ee11345d8322321c28bd61631de32455b987
- https://git.kernel.org/stable/c/fc33380ae06f438b652f66b9370b543976ac8a03



