CVE-2023-54266
Description
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()
'read' is freed when it is known to be NULL, but not when a read error occurs.
Revert the logic to avoid a small leak, should a m920x_read() call fail.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in the Linux kernel's m920x driver can occur when a read error inside the I2C transfer function fails to free allocated memory.
Vulnerability
CVE-2023-54266 is a memory leak vulnerability in the Linux kernel's m920x driver, part of the DVB-USB media subsystem. The flaw resides in the m920x_i2c_xfer() function, which dynamically allocates a buffer read for receiving data. When a call to m920x_read() fails, the error path omits kfree(read), causing the allocated memory to remain unreferenced. The description notes that read is freed only when known to be NULL, but not on read errors, creating a small but persistent leak.
Exploitation
An attacker would need local access to the system (e.g., via a crafted USB device or user-initiated I2C transactions) to trigger the error condition. The vulnerability is not remotely exploitable without prior system access. The leak is triggered only when the underlying hardware or communication fails during an I2C read, making it a low-frequency issue under normal operation.
Impact
A local attacker or malicious USB device could repeatedly induce I2C read failures, causing the kernel to leak small amounts of memory over time. While each leak is only the size of a single buffer, repeated exploitation could exhaust system memory, potentially leading to denial of service. No privilege escalation or data corruption is described.
Mitigation
The official kernel stable tree has fixed this vulnerability in commits 2b6e20ef0585 and c0178e938f11 among others [1][2][3][4]. Users should update their kernel to include the patch. No workaround is available for unpatched systems.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
9809623fedc31c0178e938f1175d6ef197c48d13a84874a2e7ca7cd02114a2b6e20ef05854feed3dfca722cc9f11aeae2ea9ef6c2e001Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/2b6e20ef0585a467c24c7e4fde28518e5b33225anvd
- git.kernel.org/stable/c/2cc9f11aeae2887a4db25c27323fc445f4b49e86nvd
- git.kernel.org/stable/c/4feed3dfca722c6d74865a37cab853c58e6aa190nvd
- git.kernel.org/stable/c/75d6ef197c488cd852493b4a419274e3489da79dnvd
- git.kernel.org/stable/c/7ca7cd02114ac8caa6b0a64734b9af6be1559353nvd
- git.kernel.org/stable/c/809623fedc31f4e74039d93bb75a8993635d7534nvd
- git.kernel.org/stable/c/c0178e938f110cdf6937f26975c0c951dbb1d9dbnvd
- git.kernel.org/stable/c/d13a84874a2e0236c9325b3adc8e126d0888ad6bnvd
- git.kernel.org/stable/c/ea9ef6c2e001c5dc94bee35ebd1c8a98621cf7b8nvd
News mentions
0No linked articles in our index yet.