CVE-2023-53719
Description
In the Linux kernel, the following vulnerability has been resolved:
serial: arc_uart: fix of_iomap leak in arc_serial_probe
Smatch reports:
drivers/tty/serial/arc_uart.c:631 arc_serial_probe() warn: 'port->membase' from of_iomap() not released on lines: 631.
In arc_serial_probe(), if uart_add_one_port() fails, port->membase is not released, which would cause a resource leak.
To fix this, I replace of_iomap with devm_platform_ioremap_resource.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A resource leak in the Linux kernel's arc_uart driver can cause memory-mapped I/O exhaustion if uart_add_one_port() fails, fixed by using devm_platform_ioremap_resource.
Vulnerability
In the Linux kernel's arc_uart serial driver, the arc_serial_probe function allocates memory-mapped I/O resources using of_iomap(). However, if the subsequent uart_add_one_port() call fails, the allocated region pointed to by port->membase is not released, leading to a resource leak. This issue was identified by Smatch static analysis.
Attack
Vector
The vulnerability can be triggered when the arc_serial_probe function is invoked and uart_add_one_port() returns an error. An attacker with the ability to cause such a probe failure (e.g., by manipulating device tree entries or triggering hotplug events) could repeatedly trigger the leak, eventually exhausting the system's I/O memory resources.
Impact
Successful exploitation could lead to denial of service (DoS) by consuming all available memory-mapped I/O space, preventing other devices from claiming necessary resources. The leak does not provide code execution or privilege escalation.
Mitigation
The fix, backported to stable kernel releases [1][2][3], replaces the manual of_iomap() with the managed devm_platform_ioremap_resource(), which automatically frees the resource if the probe fails. Users should apply the latest stable kernel updates to address this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
73f00df24a5027525aa211758153017561d28f76a18e53a66081790eee6b440a462313ba48ab5fc55d7f6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/081790eee6b47389a0d895262086d64c6a38d6e5nvd
- git.kernel.org/stable/c/153017561d2804cfae87cc9aa377aa84dd906ae1nvd
- git.kernel.org/stable/c/3f00df24a5021a6f02c1830a290acd4bceb22a2dnvd
- git.kernel.org/stable/c/40a462313ba4f337a2b419e7fb4a670f3dd95e14nvd
- git.kernel.org/stable/c/7525aa211758cc023a371e010d16ceaae1057807nvd
- git.kernel.org/stable/c/8ab5fc55d7f65d58a3c3aeadf11bdf60267cd2bdnvd
- git.kernel.org/stable/c/f76a18e53a66c0ef2938276110717b3805720cd9nvd
News mentions
0No linked articles in our index yet.