-

CVE-2023-54097

In the Linux kernel, the following vulnerability has been resolved:

regulator: stm32-pwr: fix of_iomap leak

Smatch reports:
drivers/regulator/stm32-pwr.c:166 stm32_pwr_regulator_probe() warn:
'base' from of_iomap() not released on lines: 151,166.

In stm32_pwr_regulator_probe(), base is not released
when devm_kzalloc() fails to allocate memory or
devm_regulator_register() fails to register a new regulator device,
which may cause a leak.

To fix this issue, replace of_iomap() with
devm_platform_ioremap_resource(). devm_platform_ioremap_resource()
is a specialized function for platform devices.
It allows 'base' to be automatically released whether the probe
function succeeds or fails.

Besides, use IS_ERR(base) instead of !base
as the return value of devm_platform_ioremap_resource()
can either be a pointer to the remapped memory or
an ERR_PTR() encoded error code if the operation fails.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 824683dbec234a01bd49a0589ee3323594a6f4cf
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Status affected
Version < dfce9bb3517a78507cf96f9b83948d0b81338afa
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Status affected
Version < ad6481f49fb2c703efa3a929643934f24b666d6a
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Status affected
Version < f25994f7a9ad53eb756bc4869497c3ebe281ad5e
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Status affected
Version < c091bb49b3233307c7af73dae888f0799752af3d
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Status affected
Version < 0ad07e02be0d3f0d554653382ffe53ae4879378d
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Status affected
Version < c4a413e56d16a2ae84e6d8992f215c4dcc7fac20
Version dc62f951a6a8490bcccc7b6de36cd85bd57be740
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.2
Status affected
Version < 5.2
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.243
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.