{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54183","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:06:44.497Z","datePublished":"2025-12-30T12:08:53.888Z","dateUpdated":"2026-05-11T19:57:04.159Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:57:04.159Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()\n\nIf fwnode_graph_get_remote_endpoint() fails, 'fwnode' is known to be NULL,\nso fwnode_handle_put() is a no-op.\n\nRelease the reference taken from a previous fwnode_graph_get_port_parent()\ncall instead.\n\nAlso handle fwnode_graph_get_port_parent() failures.\n\nIn order to fix these issues, add an error handling path to the function\nand the needed gotos."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/v4l2-core/v4l2-fwnode.c"],"versions":[{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"2342942331e1f034ff58f293e10d0d9b7581601f","status":"affected","versionType":"git"},{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"4bc5ffaf8ac4f3e7a1fcd10a0a0e7b022b694877","status":"affected","versionType":"git"},{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"d8a8f75fce049bdb3144b607deefe51e996b9660","status":"affected","versionType":"git"},{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"caf058833b6f3fe7beabf738110f79bb987c8fff","status":"affected","versionType":"git"},{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"25afb3e03bf8ab02567af4b6ffbfd6250a91a9f8","status":"affected","versionType":"git"},{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"ed1696f7f92e8404940d51dec80a123aa18163a8","status":"affected","versionType":"git"},{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"e8a1cd87bb9fa3149ee112ecb8058908dc9b520e","status":"affected","versionType":"git"},{"version":"ca50c197bd9610ea984cfc0dc6855f183cbb46f8","lessThan":"d7b13edd4cb4bfa335b6008ab867ac28582d3e5c","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/v4l2-core/v4l2-fwnode.c"],"versions":[{"version":"4.13","status":"affected"},{"version":"0","lessThan":"4.13","status":"unaffected","versionType":"semver"},{"version":"4.19.295","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.257","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.195","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.132","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.53","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.4.16","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5.3","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"4.19.295"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"5.4.257"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"5.10.195"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"5.15.132"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"6.1.53"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"6.4.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"6.5.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"6.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/2342942331e1f034ff58f293e10d0d9b7581601f"},{"url":"https://git.kernel.org/stable/c/4bc5ffaf8ac4f3e7a1fcd10a0a0e7b022b694877"},{"url":"https://git.kernel.org/stable/c/d8a8f75fce049bdb3144b607deefe51e996b9660"},{"url":"https://git.kernel.org/stable/c/caf058833b6f3fe7beabf738110f79bb987c8fff"},{"url":"https://git.kernel.org/stable/c/25afb3e03bf8ab02567af4b6ffbfd6250a91a9f8"},{"url":"https://git.kernel.org/stable/c/ed1696f7f92e8404940d51dec80a123aa18163a8"},{"url":"https://git.kernel.org/stable/c/e8a1cd87bb9fa3149ee112ecb8058908dc9b520e"},{"url":"https://git.kernel.org/stable/c/d7b13edd4cb4bfa335b6008ab867ac28582d3e5c"}],"title":"media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()","x_generator":{"engine":"bippy-1.2.0"}}}}