-

CVE-2023-53719

serial: arc_uart: fix of_iomap leak in `arc_serial_probe`

In the Linux kernel, the following vulnerability has been resolved:

serial: arc_uart: fix of_iomap leak in `arc_serial_probe`

Smatch reports:

drivers/tty/serial/arc_uart.c:631 arc_serial_probe() warn:
'port->membase' from of_iomap() not released on lines: 631.

In arc_serial_probe(), if uart_add_one_port() fails,
port->membase is not released, which would cause a resource leak.

To fix this, I replace of_iomap with devm_platform_ioremap_resource.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 8dbe1d5e09a7faec8d22cadcc1011acab8fa6e2a
Version < 3f00df24a5021a6f02c1830a290acd4bceb22a2d
Status affected
Version 8dbe1d5e09a7faec8d22cadcc1011acab8fa6e2a
Version < 7525aa211758cc023a371e010d16ceaae1057807
Status affected
Version 8dbe1d5e09a7faec8d22cadcc1011acab8fa6e2a
Version < 153017561d2804cfae87cc9aa377aa84dd906ae1
Status affected
Version 8dbe1d5e09a7faec8d22cadcc1011acab8fa6e2a
Version < f76a18e53a66c0ef2938276110717b3805720cd9
Status affected
Version 8dbe1d5e09a7faec8d22cadcc1011acab8fa6e2a
Version < 081790eee6b47389a0d895262086d64c6a38d6e5
Status affected
Version 8dbe1d5e09a7faec8d22cadcc1011acab8fa6e2a
Version < 40a462313ba4f337a2b419e7fb4a670f3dd95e14
Status affected
Version 8dbe1d5e09a7faec8d22cadcc1011acab8fa6e2a
Version < 8ab5fc55d7f65d58a3c3aeadf11bdf60267cd2bd
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.17
Status affected
Version 0
Version < 3.17
Status unaffected
Version <= 4.19.*
Version 4.19.284
Status unaffected
Version <= 5.4.*
Version 5.4.244
Status unaffected
Version <= 5.10.*
Version 5.10.181
Status unaffected
Version <= 5.15.*
Version 5.15.113
Status unaffected
Version <= 6.1.*
Version 6.1.30
Status unaffected
Version <= 6.3.*
Version 6.3.4
Status unaffected
Version <= *
Version 6.4
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.121
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.