CVE-2023-53724
Description
In the Linux kernel, the following vulnerability has been resolved:
mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read()
req is allocated in pcf50633_adc_async_read(), but adc_enqueue_request() could fail to insert the req into queue. We need to check the return value and free it in the case of failure.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's pcf50633 ADC driver occurs when adc_enqueue_request() fails, leaving allocated request unfreed.
Vulnerability
In the Linux kernel's pcf50633 ADC driver, the function pcf50633_adc_async_read() allocates a request structure (req) but fails to free it if adc_enqueue_request() returns an error. This oversight leads to a memory leak because the allocated memory is not released on the failure path [1].
Exploitation
An attacker with local access to the system can trigger this leak by repeatedly invoking ADC read operations that cause adc_enqueue_request() to fail. The failure could be induced by resource exhaustion or by exploiting race conditions in the driver's queue management. No special privileges beyond the ability to interact with the ADC device are required.
Impact
Each failed request leaks a small amount of kernel memory. Over time, repeated exploitation can exhaust kernel memory, leading to system instability or denial of service. The vulnerability does not directly allow code execution or privilege escalation.
Mitigation
The fix involves checking the return value of adc_enqueue_request() and freeing the allocated req if the enqueue fails. Patches have been applied to the stable kernel trees [1][2]. Users should update to the latest stable kernel version that includes the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
866616eed76df41cdf082ae00588edb4fb1f13ee13bdf0d256a8a02dcfae19cca3a4933caa62a5e7920298b450dcff23aVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/3ee13bdf0d25ae8752ae6185b6d13bbb0d5a8e30nvd
- git.kernel.org/stable/c/41cdf082ae006ea002135dfaf43b2897de3bded8nvd
- git.kernel.org/stable/c/588edb4fb1f1e6487a0f60a5f7b9a24d2d0c9f8envd
- git.kernel.org/stable/c/66616eed76dfa6f3e442907760325a023c6da7e2nvd
- git.kernel.org/stable/c/6a8a02dcfae13ab07dc7bed2b409cec7f3d32e92nvd
- git.kernel.org/stable/c/8b450dcff23aa254844492831a8e2b508a9d522dnvd
- git.kernel.org/stable/c/9cca3a4933ca365cc664d5eefb0f942374ea8b41nvd
- git.kernel.org/stable/c/a62a5e79202967176a9c1a04e477860779accd6cnvd
News mentions
0No linked articles in our index yet.