Home

Description

In the Linux kernel, the following vulnerability has been resolved: media: ov2740: Fix memleak in ov2740_init_controls() There is a kmemleak when testing the media/i2c/ov2740.c with bpf mock device: unreferenced object 0xffff8881090e19e0 (size 16): comm "51-i2c-ov2740", pid 278, jiffies 4294781584 (age 23.613s) hex dump (first 16 bytes): 00 f3 7c 0b 81 88 ff ff 80 75 6a 09 81 88 ff ff ..|......uj..... backtrace: [<000000004e9fad8f>] __kmalloc_node+0x44/0x1b0 [<0000000039c802f4>] kvmalloc_node+0x34/0x180 [<000000009b8b5c63>] v4l2_ctrl_handler_init_class+0x11d/0x180 [videodev] [<0000000038644056>] ov2740_probe+0x37d/0x84f [ov2740] [<0000000092489f59>] i2c_device_probe+0x28d/0x680 [<000000001038babe>] really_probe+0x17c/0x3f0 [<0000000098c7af1c>] __driver_probe_device+0xe3/0x170 [<00000000e1b3dc24>] device_driver_attach+0x34/0x80 [<000000005a04a34d>] bind_store+0x10b/0x1a0 [<00000000ce25d4f2>] drv_attr_store+0x49/0x70 [<000000007d9f4e9a>] sysfs_kf_write+0x8c/0xb0 [<00000000be6cff0f>] kernfs_fop_write_iter+0x216/0x2e0 [<0000000031ddb40a>] vfs_write+0x658/0x810 [<0000000041beecdd>] ksys_write+0xd6/0x1b0 [<0000000023755840>] do_syscall_64+0x38/0x90 [<00000000b2cc2da2>] entry_SYSCALL_64_after_hwframe+0x63/0xcd ov2740_init_controls() won't clean all the allocated resources in fail path, which may causes the memleaks. Add v4l2_ctrl_handler_free() to prevent memleak.

PUBLISHED Reserved 2025-09-16 | Published 2025-09-17 | Updated 2025-09-17 | Assigner Linux

Product status

Default status
unaffected

866edc895171f1256aad3e81dce193447955c202 (git) before a163ee11345d8322321c28bd61631de32455b987
affected

866edc895171f1256aad3e81dce193447955c202 (git) before 3969b2ebc66039306f505c7c630c5530800f83c0
affected

866edc895171f1256aad3e81dce193447955c202 (git) before fc33380ae06f438b652f66b9370b543976ac8a03
affected

866edc895171f1256aad3e81dce193447955c202 (git) before 7c405ee63447f14eefcfe12a18aa749abbd596ea
affected

866edc895171f1256aad3e81dce193447955c202 (git) before 2d899592ed7829d0d5140853bac4d58742a6b8af
affected

Default status
affected

5.8
affected

Any version before 5.8
unaffected

5.10.173 (semver)
unaffected

5.15.99 (semver)
unaffected

6.1.16 (semver)
unaffected

6.2.3 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a163ee11345d8322321c28bd61631de32455b987

git.kernel.org/...c/3969b2ebc66039306f505c7c630c5530800f83c0

git.kernel.org/...c/fc33380ae06f438b652f66b9370b543976ac8a03

git.kernel.org/...c/7c405ee63447f14eefcfe12a18aa749abbd596ea

git.kernel.org/...c/2d899592ed7829d0d5140853bac4d58742a6b8af

cve.org (CVE-2023-53349)

nvd.nist.gov (CVE-2023-53349)

Download JSON