๐Ÿ” CVE Alert

CVE-2023-53700

UNKNOWN 0.0

media: max9286: Fix memleak in max9286_v4l2_register()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: max9286: Fix memleak in max9286_v4l2_register() There is a kmemleak when testing the media/i2c/max9286.c with bpf mock device: kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) unreferenced object 0xffff88810defc400 (size 256): comm "python3", pid 278, jiffies 4294737563 (age 31.978s) hex dump (first 32 bytes): 28 06 a7 0a 81 88 ff ff 00 fe 22 12 81 88 ff ff (........."..... 10 c4 ef 0d 81 88 ff ff 10 c4 ef 0d 81 88 ff ff ................ backtrace: [<00000000191de6a7>] __kmalloc_node+0x44/0x1b0 [<000000002f4912b7>] kvmalloc_node+0x34/0x180 [<0000000057dc4cae>] v4l2_ctrl_new+0x325/0x10f0 [videodev] [<0000000026030272>] v4l2_ctrl_new_std+0x16f/0x210 [videodev] [<00000000f0d9ea2f>] max9286_probe+0x76e/0xbff [max9286] [<00000000ea8f6455>] i2c_device_probe+0x28d/0x680 [<0000000087529af3>] really_probe+0x17c/0x3f0 [<00000000b08be526>] __driver_probe_device+0xe3/0x170 [<000000004382edea>] driver_probe_device+0x49/0x120 [<000000007bde528a>] __device_attach_driver+0xf7/0x150 [<000000009f9c6ab4>] bus_for_each_drv+0x114/0x180 [<00000000c8aaf588>] __device_attach+0x1e5/0x2d0 [<0000000041cc06b9>] bus_probe_device+0x126/0x140 [<000000002309860d>] device_add+0x810/0x1130 [<000000002827bf98>] i2c_new_client_device+0x359/0x4f0 [<00000000593bdc85>] of_i2c_register_device+0xf1/0x110 max9286_v4l2_register() calls v4l2_ctrl_new_std(), but won't free the created v412_ctrl when fwnode_graph_get_endpoint_by_id() failed, which causes the memleak. Call v4l2_ctrl_handler_free() to free the v412_ctrl.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 22, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
66d8c9d2422da21ed41f75c03ba0685987b65fe0 < 505ff3a0c5951684c3a43094ca4c1a74683d5681 66d8c9d2422da21ed41f75c03ba0685987b65fe0 < 5897fe3ebe8252993579e1bee715ebfe5504e052 66d8c9d2422da21ed41f75c03ba0685987b65fe0 < 724039e013b34f46344abdbf8c74e6a65a828327 66d8c9d2422da21ed41f75c03ba0685987b65fe0 < 5e31213fa017c20ccc989033a5f4a626473aa2ca 66d8c9d2422da21ed41f75c03ba0685987b65fe0 < 8636c5fc7658c7c6299fb8b352d24ea4b9ba99e2
Linux / Linux
5.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/505ff3a0c5951684c3a43094ca4c1a74683d5681 git.kernel.org: https://git.kernel.org/stable/c/5897fe3ebe8252993579e1bee715ebfe5504e052 git.kernel.org: https://git.kernel.org/stable/c/724039e013b34f46344abdbf8c74e6a65a828327 git.kernel.org: https://git.kernel.org/stable/c/5e31213fa017c20ccc989033a5f4a626473aa2ca git.kernel.org: https://git.kernel.org/stable/c/8636c5fc7658c7c6299fb8b352d24ea4b9ba99e2