{"id":"CVE-2023-53519","summary":"media: v4l2-mem2mem: add lock to protect parameter num_rdy","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-mem2mem: add lock to protect parameter num_rdy\n\nGetting below error when using KCSAN to check the driver. Adding lock to\nprotect parameter num_rdy when getting the value with function:\nv4l2_m2m_num_src_bufs_ready/v4l2_m2m_num_dst_bufs_ready.\n\nkworker/u16:3: [name:report&]BUG: KCSAN: data-race in v4l2_m2m_buf_queue\nkworker/u16:3: [name:report&]\n\nkworker/u16:3: [name:report&]read-write to 0xffffff8105f35b94 of 1 bytes by task 20865 on cpu 7:\nkworker/u16:3:  v4l2_m2m_buf_queue+0xd8/0x10c","modified":"2026-05-07T04:18:02.209976Z","published":"2025-10-01T11:46:06.419Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4189-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53519.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1676748aa29099fc0abd71e0fb092e76e835f25c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/56b5c3e67b0f9af3f45cf393be048ee8d8a92694"},{"type":"WEB","url":"https://git.kernel.org/stable/c/690dd4780b3f4d755e4e7883e8c3d1b5052f6bf2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7fc7f87725805197388ba749a1801df33000fa50"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c71aa5f1cf961264690f2560503ea396b6e3c680"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e01ea1c4191ee08440b5f86db98dff695e9cedf9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e52de26cb37459b16213438a2c82feb155dd3bbd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ef009fe2010ea2a3a7045ecb72729cf366e0967b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53519.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53519"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"908a0d7c588ef87e5cf0a26805e6002a78ac9d13"},{"fixed":"690dd4780b3f4d755e4e7883e8c3d1b5052f6bf2"},{"fixed":"7fc7f87725805197388ba749a1801df33000fa50"},{"fixed":"ef009fe2010ea2a3a7045ecb72729cf366e0967b"},{"fixed":"e52de26cb37459b16213438a2c82feb155dd3bbd"},{"fixed":"1676748aa29099fc0abd71e0fb092e76e835f25c"},{"fixed":"c71aa5f1cf961264690f2560503ea396b6e3c680"},{"fixed":"e01ea1c4191ee08440b5f86db98dff695e9cedf9"},{"fixed":"56b5c3e67b0f9af3f45cf393be048ee8d8a92694"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53519.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.39"},{"fixed":"4.14.324"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.293"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.255"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.192"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.128"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.47"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53519.json"}}],"schema_version":"1.7.5"}