VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2023-53719

CVE-2023-53719

Description

In the Linux kernel, the following vulnerability has been resolved:

serial: arc_uart: fix of_iomap leak in arc_serial_probe

Smatch reports:

drivers/tty/serial/arc_uart.c:631 arc_serial_probe() warn: 'port->membase' from of_iomap() not released on lines: 631.

In arc_serial_probe(), if uart_add_one_port() fails, port->membase is not released, which would cause a resource leak.

To fix this, I replace of_iomap with devm_platform_ioremap_resource.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A resource leak in the Linux kernel's arc_uart driver can cause memory-mapped I/O exhaustion if uart_add_one_port() fails, fixed by using devm_platform_ioremap_resource.

Vulnerability

In the Linux kernel's arc_uart serial driver, the arc_serial_probe function allocates memory-mapped I/O resources using of_iomap(). However, if the subsequent uart_add_one_port() call fails, the allocated region pointed to by port->membase is not released, leading to a resource leak. This issue was identified by Smatch static analysis.

Attack

Vector

The vulnerability can be triggered when the arc_serial_probe function is invoked and uart_add_one_port() returns an error. An attacker with the ability to cause such a probe failure (e.g., by manipulating device tree entries or triggering hotplug events) could repeatedly trigger the leak, eventually exhausting the system's I/O memory resources.

Impact

Successful exploitation could lead to denial of service (DoS) by consuming all available memory-mapped I/O space, preventing other devices from claiming necessary resources. The leak does not provide code execution or privilege escalation.

Mitigation

The fix, backported to stable kernel releases [1][2][3], replaces the manual of_iomap() with the managed devm_platform_ioremap_resource(), which automatically frees the resource if the probe fails. Users should apply the latest stable kernel updates to address this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.