CVE-2023-53725 — Missing Release of Memory after Effective Lifetime in Linux
7 documents6 sources
Severity
—N/A
No vectorEPSS
0.0%
top 88.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Latest updateJan 27
Description
In the Linux kernel, the following vulnerability has been resolved:
clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe
Smatch reports:
drivers/clocksource/timer-cadence-ttc.c:529 ttc_timer_probe()
warn: 'timer_baseaddr' from of_iomap() not released on lines: 498,508,516.
timer_baseaddr may have the problem of not being released after use,
I replaced it with the devm_of_iomap() function and added the clk_put()
function to cleanup the "clk_ce" and "clk_cs".
Affected Packages5 packages
▶CVEListV5linux/linuxe932900a3279b5dbb6d8f43c7b369003620e137c — e0a9cc90ea44a50d76a84f9f9bf1703d31fe45e9+8
🔴Vulnerability Details
3GHSA▶
GHSA-2gf7-3qxp-c9rr: In the Linux kernel, the following vulnerability has been resolved:
clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe
Smatch repor↗2025-10-22
OSV▶
CVE-2023-53725: In the Linux kernel, the following vulnerability has been resolved: clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe Smatch reports↗2025-10-22