-

CVE-2023-54097

regulator: stm32-pwr: fix of_iomap leak

In the Linux kernel, the following vulnerability has been resolved:

regulator: stm32-pwr: fix of_iomap leak

Smatch reports:
drivers/regulator/stm32-pwr.c:166 stm32_pwr_regulator_probe() warn:
'base' from of_iomap() not released on lines: 151,166.

In stm32_pwr_regulator_probe(), base is not released
when devm_kzalloc() fails to allocate memory or
devm_regulator_register() fails to register a new regulator device,
which may cause a leak.

To fix this issue, replace of_iomap() with
devm_platform_ioremap_resource(). devm_platform_ioremap_resource()
is a specialized function for platform devices.
It allows 'base' to be automatically released whether the probe
function succeeds or fails.

Besides, use IS_ERR(base) instead of !base
as the return value of devm_platform_ioremap_resource()
can either be a pointer to the remapped memory or
an ERR_PTR() encoded error code if the operation fails.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Version < 824683dbec234a01bd49a0589ee3323594a6f4cf
Status affected
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Version < dfce9bb3517a78507cf96f9b83948d0b81338afa
Status affected
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Version < ad6481f49fb2c703efa3a929643934f24b666d6a
Status affected
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Version < f25994f7a9ad53eb756bc4869497c3ebe281ad5e
Status affected
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Version < c091bb49b3233307c7af73dae888f0799752af3d
Status affected
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Version < 0ad07e02be0d3f0d554653382ffe53ae4879378d
Status affected
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Version < c4a413e56d16a2ae84e6d8992f215c4dcc7fac20
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.2
Status affected
Version 0
Version < 5.2
Status unaffected
Version <= 5.4.*
Version 5.4.243
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.144
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.