CVE-2023-54208
Description
In the Linux kernel, the following vulnerability has been resolved:
media: ov5675: Fix memleak in ov5675_init_controls()
There is a kmemleak when testing the media/i2c/ov5675.c with bpf mock device:
AssertionError: unreferenced object 0xffff888107362160 (size 16): comm "python3", pid 277, jiffies 4294832798 (age 20.722s) hex dump (first 16 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000abe7d67c>] __kmalloc_node+0x44/0x1b0 [<000000008a725aac>] kvmalloc_node+0x34/0x180 [<000000009a53cd11>] v4l2_ctrl_handler_init_class+0x11d/0x180 [videodev] [<0000000055b46db0>] ov5675_probe+0x38b/0x897 [ov5675] [<00000000153d886c>] i2c_device_probe+0x28d/0x680 [<000000004afb7e8f>] really_probe+0x17c/0x3f0 [<00000000ff2f18e4>] __driver_probe_device+0xe3/0x170 [<000000000a001029>] driver_probe_device+0x49/0x120 [<00000000e39743c7>] __device_attach_driver+0xf7/0x150 [<00000000d32fd070>] bus_for_each_drv+0x114/0x180 [<000000009083ac41>] __device_attach+0x1e5/0x2d0 [<0000000015b4a830>] bus_probe_device+0x126/0x140 [<000000007813deaf>] device_add+0x810/0x1130 [<000000007becb867>] i2c_new_client_device+0x386/0x540 [<000000007f9cf4b4>] of_i2c_register_device+0xf1/0x110 [<00000000ebfdd032>] of_i2c_notify+0xfc/0x1f0
ov5675_init_controls() won't clean all the allocated resources in fail path, which may causes the memleaks. Add v4l2_ctrl_handler_free() to prevent memleak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's ov5675 camera sensor driver occurs when ov5675_init_controls() fails to free allocated resources, leading to unreferenced memory.
Vulnerability
A memory leak in ov5675_init_controls()
In the Linux kernel's media subsystem, the ov5675 camera sensor driver contains a memory leak occurs in the ov5675_init_controls() function. When this function fails partway through initialization, it does not properly free all previously allocated resources, specifically the v4l2 control handler. This results in a kmemleak warning showing an unreferenced object of size 16 bytes, as reported when testing with a BPF mock device [1].
##Exploitation and attack surface
The vulnerability is triggered during the driver's probe sequence (ov5675_probe), which calls ov5675_init_controls(). An attacker would need to cause the initialization to fail, for example by providing a faulty device or manipulating the I2C communication. No special privileges are required beyond the ability to interact with the hardware or simulate a device. The leak is exposed when the driver is loaded and the control handler initialization is interrupted.
##Impact
An attacker who can trigger the failure path can cause a memory leak, leading to gradual depletion of kernel memory. Over time, this could contribute to system instability or denial-of-service conditions. The leaked memory is not freed until the system is rebooted, making it a persistent resource drain.
##Mitigation
The fix adds a call to v4l2_ctrl_handler_free() in the error path of ov5675_init_controls(), ensuring all allocated resources are properly released. The patch has been applied to the stable kernel tree [1][2][3]. Users should update to a kernel version containing this fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
6086a80b842bcbcae9115a163ba54908ae82249b849824b987a36a6be694ddd74ed6c2130Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/086a80b842bcb621d6c4eedad20683f1f674d0c2nvd
- git.kernel.org/stable/c/49b849824b9862f177fc77fc92ef95ec54566ecfnvd
- git.kernel.org/stable/c/7a36a6be694df87d019663863b922913947b42afnvd
- git.kernel.org/stable/c/ba54908ae8225d58f1830edb394d4153bcb7d0aanvd
- git.kernel.org/stable/c/bcae9115a163198dce9126aa8bedc1c007ec30ednvd
- git.kernel.org/stable/c/dd74ed6c213003533e3abf4c204374ef01d86978nvd
News mentions
0No linked articles in our index yet.