CVE-2023-54143 (GCVE-0-2023-54143)
Vulnerability from cvelistv5 – Published: 2025-12-24 13:06 – Updated: 2025-12-24 13:06
VLAI?
Title
media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()
Summary
In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()
If we encounter any error in the vdec_msg_queue_init() then we need
to set "msg_queue->wdma_addr.size = 0;". Normally, this is done
inside the vdec_msg_queue_deinit() function. However, if the
first call to allocate &msg_queue->wdma_addr fails, then the
vdec_msg_queue_deinit() function is a no-op. For that situation, just
set the size to zero explicitly and return.
There were two other error paths which did not clean up before returning.
Change those error paths to goto mem_alloc_err.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
b199fe46f35c57a415acd4d5295b0f4e35048c11 , < 858322c409e0aba8f70810d23f35c482744f007c
(git)
Affected: b199fe46f35c57a415acd4d5295b0f4e35048c11 , < b7dbc27301f560c3b915235c53383155b3512083 (git) Affected: b199fe46f35c57a415acd4d5295b0f4e35048c11 , < 451dc187cadd47771e5d9434fe220fad7be84057 (git) Affected: b199fe46f35c57a415acd4d5295b0f4e35048c11 , < cf10b0bb503c974ba049d6f888b21178be20a962 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/media/platform/mediatek/vcodec/vdec_msg_queue.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "858322c409e0aba8f70810d23f35c482744f007c",
"status": "affected",
"version": "b199fe46f35c57a415acd4d5295b0f4e35048c11",
"versionType": "git"
},
{
"lessThan": "b7dbc27301f560c3b915235c53383155b3512083",
"status": "affected",
"version": "b199fe46f35c57a415acd4d5295b0f4e35048c11",
"versionType": "git"
},
{
"lessThan": "451dc187cadd47771e5d9434fe220fad7be84057",
"status": "affected",
"version": "b199fe46f35c57a415acd4d5295b0f4e35048c11",
"versionType": "git"
},
{
"lessThan": "cf10b0bb503c974ba049d6f888b21178be20a962",
"status": "affected",
"version": "b199fe46f35c57a415acd4d5295b0f4e35048c11",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/media/platform/mediatek/vcodec/vdec_msg_queue.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.18"
},
{
"lessThan": "5.18",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.53",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.4.*",
"status": "unaffected",
"version": "6.4.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"version": "6.5.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.6",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.53",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.16",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.3",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6",
"versionStartIncluding": "5.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()\n\nIf we encounter any error in the vdec_msg_queue_init() then we need\nto set \"msg_queue-\u003ewdma_addr.size = 0;\". Normally, this is done\ninside the vdec_msg_queue_deinit() function. However, if the\nfirst call to allocate \u0026msg_queue-\u003ewdma_addr fails, then the\nvdec_msg_queue_deinit() function is a no-op. For that situation, just\nset the size to zero explicitly and return.\n\nThere were two other error paths which did not clean up before returning.\nChange those error paths to goto mem_alloc_err."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-24T13:06:56.869Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/858322c409e0aba8f70810d23f35c482744f007c"
},
{
"url": "https://git.kernel.org/stable/c/b7dbc27301f560c3b915235c53383155b3512083"
},
{
"url": "https://git.kernel.org/stable/c/451dc187cadd47771e5d9434fe220fad7be84057"
},
{
"url": "https://git.kernel.org/stable/c/cf10b0bb503c974ba049d6f888b21178be20a962"
}
],
"title": "media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-54143",
"datePublished": "2025-12-24T13:06:56.869Z",
"dateReserved": "2025-12-24T13:02:52.523Z",
"dateUpdated": "2025-12-24T13:06:56.869Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-54143\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T13:16:16.313\",\"lastModified\":\"2025-12-24T13:16:16.313\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()\\n\\nIf we encounter any error in the vdec_msg_queue_init() then we need\\nto set \\\"msg_queue-\u003ewdma_addr.size = 0;\\\". Normally, this is done\\ninside the vdec_msg_queue_deinit() function. However, if the\\nfirst call to allocate \u0026msg_queue-\u003ewdma_addr fails, then the\\nvdec_msg_queue_deinit() function is a no-op. For that situation, just\\nset the size to zero explicitly and return.\\n\\nThere were two other error paths which did not clean up before returning.\\nChange those error paths to goto mem_alloc_err.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/451dc187cadd47771e5d9434fe220fad7be84057\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/858322c409e0aba8f70810d23f35c482744f007c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b7dbc27301f560c3b915235c53383155b3512083\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cf10b0bb503c974ba049d6f888b21178be20a962\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…